General

  • Target

    JaffaCakes118_00b236a1c09106491a884180fa90ed4c

  • Size

    512KB

  • Sample

    250105-24d9wayld1

  • MD5

    00b236a1c09106491a884180fa90ed4c

  • SHA1

    9dd6761803e8291d43ad6a5e1ba2fb71fa7f8ed7

  • SHA256

    38b23fc2cae0bb91dd9a8fbb5c3451b9c81d6536a309f8b5e9edb55b978ea91d

  • SHA512

    fc5f02e8f246d6d96e12559022f9e7303cbd7de31b157324f794e4b8b92d49c26c127dfea23e4d7a7f005519b09b17a057e0f9bb7db2c6576b17e82a5fb86323

  • SSDEEP

    12288:ekuuSPYFLXgnZHLM2rs+8wSE5QG160owZGEX8c1:etlc4JSaQb09sED

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_00b236a1c09106491a884180fa90ed4c

    • Size

      512KB

    • MD5

      00b236a1c09106491a884180fa90ed4c

    • SHA1

      9dd6761803e8291d43ad6a5e1ba2fb71fa7f8ed7

    • SHA256

      38b23fc2cae0bb91dd9a8fbb5c3451b9c81d6536a309f8b5e9edb55b978ea91d

    • SHA512

      fc5f02e8f246d6d96e12559022f9e7303cbd7de31b157324f794e4b8b92d49c26c127dfea23e4d7a7f005519b09b17a057e0f9bb7db2c6576b17e82a5fb86323

    • SSDEEP

      12288:ekuuSPYFLXgnZHLM2rs+8wSE5QG160owZGEX8c1:etlc4JSaQb09sED

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks