General
-
Target
JaffaCakes118_7da61e71c86e19260fb9cd249903705b
-
Size
595KB
-
Sample
250107-2vpn9asnat
-
MD5
7da61e71c86e19260fb9cd249903705b
-
SHA1
6980333775ee7db0dcd198877674e910f37b3582
-
SHA256
38fe429574672dcb96ad18874370e85cf46bcaf912250e2a9b60e04e9a00a2ff
-
SHA512
d140010776b7e26a737b85c91bd7fb76d5e6d74df0c644e93da56d20a26423701f7605e46294d46b75bf154c9e26a8bbe9a43c1e016394c8e7336a80e41e53af
-
SSDEEP
12288:xFdi+7NvWv6lW4QSOxxU1MTtzl2BYQm97Un+U+5GMedLPPxjuD4b5V:xLiwNz0V6CDByoG3PPxCD
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7da61e71c86e19260fb9cd249903705b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7da61e71c86e19260fb9cd249903705b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
acea450e34e990b055ec3f61bbf5320fab082758
-
url4cnc
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Targets
-
-
Target
JaffaCakes118_7da61e71c86e19260fb9cd249903705b
-
Size
595KB
-
MD5
7da61e71c86e19260fb9cd249903705b
-
SHA1
6980333775ee7db0dcd198877674e910f37b3582
-
SHA256
38fe429574672dcb96ad18874370e85cf46bcaf912250e2a9b60e04e9a00a2ff
-
SHA512
d140010776b7e26a737b85c91bd7fb76d5e6d74df0c644e93da56d20a26423701f7605e46294d46b75bf154c9e26a8bbe9a43c1e016394c8e7336a80e41e53af
-
SSDEEP
12288:xFdi+7NvWv6lW4QSOxxU1MTtzl2BYQm97Un+U+5GMedLPPxjuD4b5V:xLiwNz0V6CDByoG3PPxCD
-
Raccoon Stealer V1 payload
-
Raccoon family
-