General
-
Target
JaffaCakes118_c21efa267e094c4dad927c976bc94c31
-
Size
512KB
-
Sample
250109-h51dysvqej
-
MD5
c21efa267e094c4dad927c976bc94c31
-
SHA1
48b4db86e22a916df21b8b1b106e1f17b2968ba0
-
SHA256
bf5884d6d1d6bb564de362189ca4857ba1ef1d49a81669a8230f37bcad8d5829
-
SHA512
28e16901175d79431c273eded4b7ffc6212f5663a716dd66eb42a4ae3765bdcdb8161b2a893c0e8500e0123d08e9e4e9222e563a21343ae07643266d6bb41c30
-
SSDEEP
12288:AkuuSP4H1DZXw6/yEMAmXDq54PWCks2D/FAvfSvwZGEX8cP:AtlCbbK1DzXPWnTFafSosEN
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c21efa267e094c4dad927c976bc94c31.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c21efa267e094c4dad927c976bc94c31.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
887a0ffaca448362277f2227182491216b734133
-
url4cnc
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Targets
-
-
Target
JaffaCakes118_c21efa267e094c4dad927c976bc94c31
-
Size
512KB
-
MD5
c21efa267e094c4dad927c976bc94c31
-
SHA1
48b4db86e22a916df21b8b1b106e1f17b2968ba0
-
SHA256
bf5884d6d1d6bb564de362189ca4857ba1ef1d49a81669a8230f37bcad8d5829
-
SHA512
28e16901175d79431c273eded4b7ffc6212f5663a716dd66eb42a4ae3765bdcdb8161b2a893c0e8500e0123d08e9e4e9222e563a21343ae07643266d6bb41c30
-
SSDEEP
12288:AkuuSP4H1DZXw6/yEMAmXDq54PWCks2D/FAvfSvwZGEX8cP:AtlCbbK1DzXPWnTFafSosEN
-
Raccoon Stealer V1 payload
-
Raccoon family
-