Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 23:07

General

  • Target

    JaffaCakes118_00b236a1c09106491a884180fa90ed4c.exe

  • Size

    512KB

  • MD5

    00b236a1c09106491a884180fa90ed4c

  • SHA1

    9dd6761803e8291d43ad6a5e1ba2fb71fa7f8ed7

  • SHA256

    38b23fc2cae0bb91dd9a8fbb5c3451b9c81d6536a309f8b5e9edb55b978ea91d

  • SHA512

    fc5f02e8f246d6d96e12559022f9e7303cbd7de31b157324f794e4b8b92d49c26c127dfea23e4d7a7f005519b09b17a057e0f9bb7db2c6576b17e82a5fb86323

  • SSDEEP

    12288:ekuuSPYFLXgnZHLM2rs+8wSE5QG160owZGEX8c1:etlc4JSaQb09sED

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 6 IoCs
  • Raccoon family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00b236a1c09106491a884180fa90ed4c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_00b236a1c09106491a884180fa90ed4c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4764-0-0x00000000030F0000-0x000000000313E000-memory.dmp

    Filesize

    312KB

  • memory/4764-1-0x0000000004CF0000-0x0000000004D7E000-memory.dmp

    Filesize

    568KB

  • memory/4764-2-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/4764-4-0x00000000030F0000-0x000000000313E000-memory.dmp

    Filesize

    312KB

  • memory/4764-3-0x0000000000400000-0x0000000002F47000-memory.dmp

    Filesize

    43.3MB

  • memory/4764-5-0x0000000004CF0000-0x0000000004D7E000-memory.dmp

    Filesize

    568KB

  • memory/4764-6-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/4764-9-0x0000000000400000-0x0000000002F47000-memory.dmp

    Filesize

    43.3MB