General

  • Target

    JaffaCakes118_05b3178700c7f8e60b17fbf3022a95b3

  • Size

    512KB

  • Sample

    250106-bh58cstldj

  • MD5

    05b3178700c7f8e60b17fbf3022a95b3

  • SHA1

    3bfe1b561fb10ba2783dd9f3f28bbd97681e2e95

  • SHA256

    e5e923e4bc5b56bc8d6c40da399419f959facc886c5264eb382af4eb17c316ef

  • SHA512

    f751aac881d27ea49f9a95a23fd52f15b1ef2bd16e9a4d5d0cb1ca306850cddad6c48bba13354e5306de300b6f5bbd8f8dd94453afaa16d910e406b36a9f930f

  • SSDEEP

    6144:nydl2g9K7regCUSifuZYYrXxuwPn6PTQ096NLAdr3uuJ5hWtENnIADG8elO:nUl2gc6UOZYYrgwPncQ0kEdr3uuGGxD3

Malware Config

Extracted

Family

raccoon

Botnet

ac738e6383a48d6a74aeab7c52ebcd50f76032ee

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_05b3178700c7f8e60b17fbf3022a95b3

    • Size

      512KB

    • MD5

      05b3178700c7f8e60b17fbf3022a95b3

    • SHA1

      3bfe1b561fb10ba2783dd9f3f28bbd97681e2e95

    • SHA256

      e5e923e4bc5b56bc8d6c40da399419f959facc886c5264eb382af4eb17c316ef

    • SHA512

      f751aac881d27ea49f9a95a23fd52f15b1ef2bd16e9a4d5d0cb1ca306850cddad6c48bba13354e5306de300b6f5bbd8f8dd94453afaa16d910e406b36a9f930f

    • SSDEEP

      6144:nydl2g9K7regCUSifuZYYrXxuwPn6PTQ096NLAdr3uuJ5hWtENnIADG8elO:nUl2gc6UOZYYrgwPncQ0kEdr3uuGGxD3

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks