General

  • Target

    JaffaCakes118_cb4d313e175da750a6a77df024b21a3a

  • Size

    582KB

  • Sample

    250109-skqdcsvmgp

  • MD5

    cb4d313e175da750a6a77df024b21a3a

  • SHA1

    e34bd554a16fb07f259e6413f881c0a0b9f5cbf3

  • SHA256

    f91bfc64157a1a9090b0255cf0ca5f1eabeb4489d6422e32c5253f3d61d6dd3a

  • SHA512

    80be454c5c313337bea4fd60f0e642cfd76cec6bbdb9a41a3f3d584d27f29e84c3e802c08c595e0cb81c2e1ee2e720a1e692af9168f0afdf0d0a450fc5708699

  • SSDEEP

    12288:Qt4F0yi4xItk6aK/JlDRCYnyjaKDASBTDu6eMrMLN8IHI+m5n+5:QMvi4xF6au8YnasSNu1N8IHYW

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_cb4d313e175da750a6a77df024b21a3a

    • Size

      582KB

    • MD5

      cb4d313e175da750a6a77df024b21a3a

    • SHA1

      e34bd554a16fb07f259e6413f881c0a0b9f5cbf3

    • SHA256

      f91bfc64157a1a9090b0255cf0ca5f1eabeb4489d6422e32c5253f3d61d6dd3a

    • SHA512

      80be454c5c313337bea4fd60f0e642cfd76cec6bbdb9a41a3f3d584d27f29e84c3e802c08c595e0cb81c2e1ee2e720a1e692af9168f0afdf0d0a450fc5708699

    • SSDEEP

      12288:Qt4F0yi4xItk6aK/JlDRCYnyjaKDASBTDu6eMrMLN8IHI+m5n+5:QMvi4xF6au8YnasSNu1N8IHYW

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks