General

  • Target

    47eb39f8de30cf0d936429215157c077baace26466be8ea7c4740507cf70c9f7

  • Size

    864KB

  • Sample

    220508-g91pvacdcp

  • MD5

    8704975577a36a533a0814b87365d2f2

  • SHA1

    20db7d8b03d2a055e88a1208cf4a4fce5ad97ccf

  • SHA256

    47eb39f8de30cf0d936429215157c077baace26466be8ea7c4740507cf70c9f7

  • SHA512

    00d67c89e1986479d10e466f085f26ba203eaafad42885d96be364b002c40674ddc934778e9766398bc471293ede386e5b8a4c119d6cfeee251ee6f697729c51

Malware Config

Extracted

Family

raccoon

Botnet

46b6d09f2c8e3b71cc4537d922db5bb050015ae9

Attributes
  • url4cnc

    https://telete.in/sementrue

rc4.plain
rc4.plain

Targets

    • Target

      47eb39f8de30cf0d936429215157c077baace26466be8ea7c4740507cf70c9f7

    • Size

      864KB

    • MD5

      8704975577a36a533a0814b87365d2f2

    • SHA1

      20db7d8b03d2a055e88a1208cf4a4fce5ad97ccf

    • SHA256

      47eb39f8de30cf0d936429215157c077baace26466be8ea7c4740507cf70c9f7

    • SHA512

      00d67c89e1986479d10e466f085f26ba203eaafad42885d96be364b002c40674ddc934778e9766398bc471293ede386e5b8a4c119d6cfeee251ee6f697729c51

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks