General

  • Target

    a8b90c40140aa2e6115ee8f22c17068e

  • Size

    583KB

  • Sample

    231227-h9pg9acafk

  • MD5

    a8b90c40140aa2e6115ee8f22c17068e

  • SHA1

    89ecce8c3e112c0a5bb55774cae903cece0b8a7c

  • SHA256

    4b22fbc08005b6448d015e25cd97245df4bb1c2731c13db78afef37ee9ff020d

  • SHA512

    308a69f53fc185de8cb15d186135e21474f58dd6a871b0bbf1f1dfdb4e8e1d381327e09b0f59e9cc60892051a08a72b8c2d2e3a1f0677717b4e04603dad646d2

  • SSDEEP

    12288:rOI5LUbbmMdkEPqrwbjYK6eMygPSMdnc6vx1PBCPE3nSZ8zRaC62:/UbbmMXgEXgPSMdnvPP8PswC

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

b5998c5938c0648ce1e41086dc9f3e22ac1750bd

Attributes
  • url4cnc

    https://telete.in/forkmaster123

rc4.plain
rc4.plain

Targets

    • Target

      a8b90c40140aa2e6115ee8f22c17068e

    • Size

      583KB

    • MD5

      a8b90c40140aa2e6115ee8f22c17068e

    • SHA1

      89ecce8c3e112c0a5bb55774cae903cece0b8a7c

    • SHA256

      4b22fbc08005b6448d015e25cd97245df4bb1c2731c13db78afef37ee9ff020d

    • SHA512

      308a69f53fc185de8cb15d186135e21474f58dd6a871b0bbf1f1dfdb4e8e1d381327e09b0f59e9cc60892051a08a72b8c2d2e3a1f0677717b4e04603dad646d2

    • SSDEEP

      12288:rOI5LUbbmMdkEPqrwbjYK6eMygPSMdnc6vx1PBCPE3nSZ8zRaC62:/UbbmMXgEXgPSMdnvPP8PswC

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks