General

  • Target

    0cbed4ae7257f56ab563b035cc7e15392653f24712a62c7bcb0d95dd627b3f40

  • Size

    546KB

  • Sample

    220708-jvxezsadf3

  • MD5

    84d14ef4ba432c36a5d4cfa4f8d4f1c9

  • SHA1

    b2b8c4cf9e329184613f44a4ee7916441445f479

  • SHA256

    0cbed4ae7257f56ab563b035cc7e15392653f24712a62c7bcb0d95dd627b3f40

  • SHA512

    ff6266f313c4c8c00d2cc99bf6f65d6ff9a31b89a086ee2e95dba1a354e2e47880cc97cd997b0b18bb4c96d64c342c2ab8ed3c16fecf12727284f9cd0b5cc51e

Malware Config

Extracted

Family

raccoon

Version

1.7.2

Botnet

9ba64f4b6fe448911470a88f09d6e7d5b92ff0ab

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Targets

    • Target

      0cbed4ae7257f56ab563b035cc7e15392653f24712a62c7bcb0d95dd627b3f40

    • Size

      546KB

    • MD5

      84d14ef4ba432c36a5d4cfa4f8d4f1c9

    • SHA1

      b2b8c4cf9e329184613f44a4ee7916441445f479

    • SHA256

      0cbed4ae7257f56ab563b035cc7e15392653f24712a62c7bcb0d95dd627b3f40

    • SHA512

      ff6266f313c4c8c00d2cc99bf6f65d6ff9a31b89a086ee2e95dba1a354e2e47880cc97cd997b0b18bb4c96d64c342c2ab8ed3c16fecf12727284f9cd0b5cc51e

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

MITRE ATT&CK Matrix

Tasks