General

  • Target

    42b5e1b39fbd5952799a83c063617e0c1010447bffce1bec27ef5e331848aa67

  • Size

    675KB

  • Sample

    220515-1clzzagaf5

  • MD5

    8ec29972dfd9a10e3da2c9ee240cc755

  • SHA1

    5980b3c0314fc20f5ac6f3db31bbed41192c193a

  • SHA256

    42b5e1b39fbd5952799a83c063617e0c1010447bffce1bec27ef5e331848aa67

  • SHA512

    7432c3fc1afcf3ea8562c744d0bb750badc52a25e3fd1e3cbeb4cbf4e4e2c4e23f16200ee45cb1d3e3ce2ca7524f0330dfe239bdc25d5faa9a2cd37f8f9a1120

Malware Config

Extracted

Family

raccoon

Botnet

218710f63bc498a79834837a7fbeda5d33dd357c

Attributes
  • url4cnc

    https://telete.in/h_sinnerman_1

rc4.plain
rc4.plain

Targets

    • Target

      42b5e1b39fbd5952799a83c063617e0c1010447bffce1bec27ef5e331848aa67

    • Size

      675KB

    • MD5

      8ec29972dfd9a10e3da2c9ee240cc755

    • SHA1

      5980b3c0314fc20f5ac6f3db31bbed41192c193a

    • SHA256

      42b5e1b39fbd5952799a83c063617e0c1010447bffce1bec27ef5e331848aa67

    • SHA512

      7432c3fc1afcf3ea8562c744d0bb750badc52a25e3fd1e3cbeb4cbf4e4e2c4e23f16200ee45cb1d3e3ce2ca7524f0330dfe239bdc25d5faa9a2cd37f8f9a1120

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks