General

  • Target

    5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811

  • Size

    1.7MB

  • Sample

    220418-m5yycafhe9

  • MD5

    1d55cd27d142396c39e7d29f1b6e6370

  • SHA1

    efc250b5b8cea38628763a9f6d68eba3471be757

  • SHA256

    5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811

  • SHA512

    af250f2195feda5b2a3c31be6d0f1a3fc7c9ac96cbd9533bfe3dc3b1ad1d6a56cf4d4965141f3d08243c9dc7de0ff1580996164e70668f2cd58e9d0bbd3998a5

Malware Config

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811

    • Size

      1.7MB

    • MD5

      1d55cd27d142396c39e7d29f1b6e6370

    • SHA1

      efc250b5b8cea38628763a9f6d68eba3471be757

    • SHA256

      5225d48cc6d91ca1882329e6c1dd539b596fe09bf97ef97833a62e471ceb5811

    • SHA512

      af250f2195feda5b2a3c31be6d0f1a3fc7c9ac96cbd9533bfe3dc3b1ad1d6a56cf4d4965141f3d08243c9dc7de0ff1580996164e70668f2cd58e9d0bbd3998a5

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks