General
-
Target
JaffaCakes118_fa80dd942d6169378437f2517ad970cb
-
Size
512KB
-
Sample
250111-h1mbjasqdm
-
MD5
fa80dd942d6169378437f2517ad970cb
-
SHA1
e1679f81c699cf18e56347a4ce68928e6dbeda82
-
SHA256
d75b22432f999211f6c78778321f07669876fa88082ca7ec726fd4040a2a5d57
-
SHA512
283d62c57b13f04a0f18597e8ce92f186f7f94989adb42ac13bee936c0c7f7dbb8ce81269df9a30829e4ed04953a534850cfb3200c806fb15ac7fc5988d591ca
-
SSDEEP
12288:T/xfMNQVioQ5Fv0gMEJcjSPREMKd9QZqxDb:TJENQViBa0iGREdd93J
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fa80dd942d6169378437f2517ad970cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fa80dd942d6169378437f2517ad970cb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
887a0ffaca448362277f2227182491216b734133
-
url4cnc
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Targets
-
-
Target
JaffaCakes118_fa80dd942d6169378437f2517ad970cb
-
Size
512KB
-
MD5
fa80dd942d6169378437f2517ad970cb
-
SHA1
e1679f81c699cf18e56347a4ce68928e6dbeda82
-
SHA256
d75b22432f999211f6c78778321f07669876fa88082ca7ec726fd4040a2a5d57
-
SHA512
283d62c57b13f04a0f18597e8ce92f186f7f94989adb42ac13bee936c0c7f7dbb8ce81269df9a30829e4ed04953a534850cfb3200c806fb15ac7fc5988d591ca
-
SSDEEP
12288:T/xfMNQVioQ5Fv0gMEJcjSPREMKd9QZqxDb:TJENQViBa0iGREdd93J
-
Raccoon Stealer V1 payload
-
Raccoon family
-