General

  • Target

    JaffaCakes118_fa80dd942d6169378437f2517ad970cb

  • Size

    512KB

  • Sample

    250111-h1mbjasqdm

  • MD5

    fa80dd942d6169378437f2517ad970cb

  • SHA1

    e1679f81c699cf18e56347a4ce68928e6dbeda82

  • SHA256

    d75b22432f999211f6c78778321f07669876fa88082ca7ec726fd4040a2a5d57

  • SHA512

    283d62c57b13f04a0f18597e8ce92f186f7f94989adb42ac13bee936c0c7f7dbb8ce81269df9a30829e4ed04953a534850cfb3200c806fb15ac7fc5988d591ca

  • SSDEEP

    12288:T/xfMNQVioQ5Fv0gMEJcjSPREMKd9QZqxDb:TJENQViBa0iGREdd93J

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_fa80dd942d6169378437f2517ad970cb

    • Size

      512KB

    • MD5

      fa80dd942d6169378437f2517ad970cb

    • SHA1

      e1679f81c699cf18e56347a4ce68928e6dbeda82

    • SHA256

      d75b22432f999211f6c78778321f07669876fa88082ca7ec726fd4040a2a5d57

    • SHA512

      283d62c57b13f04a0f18597e8ce92f186f7f94989adb42ac13bee936c0c7f7dbb8ce81269df9a30829e4ed04953a534850cfb3200c806fb15ac7fc5988d591ca

    • SSDEEP

      12288:T/xfMNQVioQ5Fv0gMEJcjSPREMKd9QZqxDb:TJENQViBa0iGREdd93J

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks