General
-
Target
JaffaCakes118_00b236a1c09106491a884180fa90ed4c
-
Size
512KB
-
Sample
250105-24d9wayld1
-
MD5
00b236a1c09106491a884180fa90ed4c
-
SHA1
9dd6761803e8291d43ad6a5e1ba2fb71fa7f8ed7
-
SHA256
38b23fc2cae0bb91dd9a8fbb5c3451b9c81d6536a309f8b5e9edb55b978ea91d
-
SHA512
fc5f02e8f246d6d96e12559022f9e7303cbd7de31b157324f794e4b8b92d49c26c127dfea23e4d7a7f005519b09b17a057e0f9bb7db2c6576b17e82a5fb86323
-
SSDEEP
12288:ekuuSPYFLXgnZHLM2rs+8wSE5QG160owZGEX8c1:etlc4JSaQb09sED
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_00b236a1c09106491a884180fa90ed4c.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_00b236a1c09106491a884180fa90ed4c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
887a0ffaca448362277f2227182491216b734133
-
url4cnc
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Targets
-
-
Target
JaffaCakes118_00b236a1c09106491a884180fa90ed4c
-
Size
512KB
-
MD5
00b236a1c09106491a884180fa90ed4c
-
SHA1
9dd6761803e8291d43ad6a5e1ba2fb71fa7f8ed7
-
SHA256
38b23fc2cae0bb91dd9a8fbb5c3451b9c81d6536a309f8b5e9edb55b978ea91d
-
SHA512
fc5f02e8f246d6d96e12559022f9e7303cbd7de31b157324f794e4b8b92d49c26c127dfea23e4d7a7f005519b09b17a057e0f9bb7db2c6576b17e82a5fb86323
-
SSDEEP
12288:ekuuSPYFLXgnZHLM2rs+8wSE5QG160owZGEX8c1:etlc4JSaQb09sED
-
Raccoon Stealer V1 payload
-
Raccoon family
-