General

  • Target

    e1855703193393b22bd8a978dfe9428d6f357cb6773c5126d42a08b9faed33c3

  • Size

    2.5MB

  • Sample

    220516-qalw3sfahm

  • MD5

    0d48cb857d930b968876f0616fc175b1

  • SHA1

    0d506c8ced881691e13bddd8dc822fb45b934ad2

  • SHA256

    e1855703193393b22bd8a978dfe9428d6f357cb6773c5126d42a08b9faed33c3

  • SHA512

    08e4bab8421a88a087e7882cc41546db3a2e9a5f4295ad469e878219573f8766210136a2e8910a8072105466b6c2e7636e97d7f6a4dc20153bef66e0adbbf5d4

Malware Config

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      e1855703193393b22bd8a978dfe9428d6f357cb6773c5126d42a08b9faed33c3

    • Size

      2.5MB

    • MD5

      0d48cb857d930b968876f0616fc175b1

    • SHA1

      0d506c8ced881691e13bddd8dc822fb45b934ad2

    • SHA256

      e1855703193393b22bd8a978dfe9428d6f357cb6773c5126d42a08b9faed33c3

    • SHA512

      08e4bab8421a88a087e7882cc41546db3a2e9a5f4295ad469e878219573f8766210136a2e8910a8072105466b6c2e7636e97d7f6a4dc20153bef66e0adbbf5d4

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks