General

  • Target

    JaffaCakes118_e63332fa24d21c02e10524857494b137

  • Size

    512KB

  • Sample

    250110-rd746awlfv

  • MD5

    e63332fa24d21c02e10524857494b137

  • SHA1

    aec546a6c6c5634a7785e91c157a0b0d7e93f6b4

  • SHA256

    1bf39d3fbf0e8667189022ec2b189357d48ff517df96a0810f4f809fa8e5809f

  • SHA512

    a651d7afb4b90d562c62ad2aa8810219ffe5a9a511479c379e439a74b10e93468d268e9c6898214de084d5e826f8730654f23cf2b77daed2b038ff10c198185d

  • SSDEEP

    12288:pUl2gcgVl64m/E2pxWeVGdPfrAxWTqYjc4mwEUBxDO:pW2DgVIh/EEYPsUI4CE4

Malware Config

Extracted

Family

raccoon

Botnet

ac738e6383a48d6a74aeab7c52ebcd50f76032ee

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_e63332fa24d21c02e10524857494b137

    • Size

      512KB

    • MD5

      e63332fa24d21c02e10524857494b137

    • SHA1

      aec546a6c6c5634a7785e91c157a0b0d7e93f6b4

    • SHA256

      1bf39d3fbf0e8667189022ec2b189357d48ff517df96a0810f4f809fa8e5809f

    • SHA512

      a651d7afb4b90d562c62ad2aa8810219ffe5a9a511479c379e439a74b10e93468d268e9c6898214de084d5e826f8730654f23cf2b77daed2b038ff10c198185d

    • SSDEEP

      12288:pUl2gcgVl64m/E2pxWeVGdPfrAxWTqYjc4mwEUBxDO:pW2DgVIh/EEYPsUI4CE4

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks