General

  • Target

    JaffaCakes118_c21efa267e094c4dad927c976bc94c31

  • Size

    512KB

  • Sample

    250109-h51dysvqej

  • MD5

    c21efa267e094c4dad927c976bc94c31

  • SHA1

    48b4db86e22a916df21b8b1b106e1f17b2968ba0

  • SHA256

    bf5884d6d1d6bb564de362189ca4857ba1ef1d49a81669a8230f37bcad8d5829

  • SHA512

    28e16901175d79431c273eded4b7ffc6212f5663a716dd66eb42a4ae3765bdcdb8161b2a893c0e8500e0123d08e9e4e9222e563a21343ae07643266d6bb41c30

  • SSDEEP

    12288:AkuuSP4H1DZXw6/yEMAmXDq54PWCks2D/FAvfSvwZGEX8cP:AtlCbbK1DzXPWnTFafSosEN

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_c21efa267e094c4dad927c976bc94c31

    • Size

      512KB

    • MD5

      c21efa267e094c4dad927c976bc94c31

    • SHA1

      48b4db86e22a916df21b8b1b106e1f17b2968ba0

    • SHA256

      bf5884d6d1d6bb564de362189ca4857ba1ef1d49a81669a8230f37bcad8d5829

    • SHA512

      28e16901175d79431c273eded4b7ffc6212f5663a716dd66eb42a4ae3765bdcdb8161b2a893c0e8500e0123d08e9e4e9222e563a21343ae07643266d6bb41c30

    • SSDEEP

      12288:AkuuSP4H1DZXw6/yEMAmXDq54PWCks2D/FAvfSvwZGEX8cP:AtlCbbK1DzXPWnTFafSosEN

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks