General

  • Target

    JaffaCakes118_b80dbd2f2d2604242344a90860718718

  • Size

    512KB

  • Sample

    250109-cdxabssre1

  • MD5

    b80dbd2f2d2604242344a90860718718

  • SHA1

    115db4afdb61dc554d84cbbbef745f23c5534919

  • SHA256

    2724e216710da4a288b8fbb671df2a7f9c446655df869601bc463a0c6c124564

  • SHA512

    bba06b97e1c085f2124ac16c52c171438f1356138ab99cf86c6cb2f76a9660cdb28d3cae9d1202bae704e91f91766759aa0bfd3684e7bfd7a03484e0f084b567

  • SSDEEP

    12288:fkuuSPyFkFFOpNf4hiGW1jQK2kAwGpIwZGEX8cI:ftlGki4h0QK2HVsEC

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_b80dbd2f2d2604242344a90860718718

    • Size

      512KB

    • MD5

      b80dbd2f2d2604242344a90860718718

    • SHA1

      115db4afdb61dc554d84cbbbef745f23c5534919

    • SHA256

      2724e216710da4a288b8fbb671df2a7f9c446655df869601bc463a0c6c124564

    • SHA512

      bba06b97e1c085f2124ac16c52c171438f1356138ab99cf86c6cb2f76a9660cdb28d3cae9d1202bae704e91f91766759aa0bfd3684e7bfd7a03484e0f084b567

    • SSDEEP

      12288:fkuuSPyFkFFOpNf4hiGW1jQK2kAwGpIwZGEX8cI:ftlGki4h0QK2HVsEC

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks