General

  • Target

    JaffaCakes118_d1ceb14f67c000f686aa0017c30bd54a

  • Size

    593KB

  • Sample

    250109-zeqv9ssnbl

  • MD5

    d1ceb14f67c000f686aa0017c30bd54a

  • SHA1

    07f74f6f43bad4d58027a49d50b8e394029a25b1

  • SHA256

    d89bf052a97ac09968b4832856b1d61c6b659ea74d1de47fec5b85e1a3a1bd9b

  • SHA512

    39a03992fda156aaefd24698c9cd534899d9b3053d8d68da70bec563ae2d447ae26fc5850cc0586170791b708116b6f2e8fe77c7db013f69641ab56c55ce094d

  • SSDEEP

    12288:4ifMkq1GyEAYfmZb1ib+RPJWRgEMR3uFySrSrDCPKrWSJh:4ibCGyEPYbMOMGEOuYDCPKt

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_d1ceb14f67c000f686aa0017c30bd54a

    • Size

      593KB

    • MD5

      d1ceb14f67c000f686aa0017c30bd54a

    • SHA1

      07f74f6f43bad4d58027a49d50b8e394029a25b1

    • SHA256

      d89bf052a97ac09968b4832856b1d61c6b659ea74d1de47fec5b85e1a3a1bd9b

    • SHA512

      39a03992fda156aaefd24698c9cd534899d9b3053d8d68da70bec563ae2d447ae26fc5850cc0586170791b708116b6f2e8fe77c7db013f69641ab56c55ce094d

    • SSDEEP

      12288:4ifMkq1GyEAYfmZb1ib+RPJWRgEMR3uFySrSrDCPKrWSJh:4ibCGyEPYbMOMGEOuYDCPKt

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks