General

  • Target

    0427b3ecda18d67665d14b989d6296fe02b74cf27b872.exe

  • Size

    453KB

  • Sample

    210722-hf3hkgcyax

  • MD5

    85ccac3064ee0b602935f2b9f5fb6656

  • SHA1

    0f1d9b825b0ac2e344408eaeb84631ac042fbc8b

  • SHA256

    0427b3ecda18d67665d14b989d6296fe02b74cf27b8721a5fd09cc14a92493b5

  • SHA512

    48566ffe4ab1c75474dbd63cfb2911917590a20401f5ae464bff8b73dd01d329f9182627a7f4417c1e14ebdb8de69487d1d33fab99ec1a486c31aeed16c15c23

Malware Config

Extracted

Family

raccoon

Botnet

e8fb6fbcbde044a603db529c2275bbfece556557

Attributes
url4cnc
https://telete.in/h_ghaibin2_1
rc4.plain
rc4.plain

Targets

    • Target

      0427b3ecda18d67665d14b989d6296fe02b74cf27b872.exe

    • Size

      453KB

    • MD5

      85ccac3064ee0b602935f2b9f5fb6656

    • SHA1

      0f1d9b825b0ac2e344408eaeb84631ac042fbc8b

    • SHA256

      0427b3ecda18d67665d14b989d6296fe02b74cf27b8721a5fd09cc14a92493b5

    • SHA512

      48566ffe4ab1c75474dbd63cfb2911917590a20401f5ae464bff8b73dd01d329f9182627a7f4417c1e14ebdb8de69487d1d33fab99ec1a486c31aeed16c15c23

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Discovery

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation

                        Tasks