General

  • Target

    11f62ec14db4f5cfa9f64ff3e4eb2ff0

  • Size

    565KB

  • MD5

    11f62ec14db4f5cfa9f64ff3e4eb2ff0

  • SHA1

    5690b91c36eb26c998ba8627e914e2c26078b284

  • SHA256

    12107296431035e7f584952fd46061078487a6d61446082bd10bd259cf2b8af9

  • SHA512

    6dda554c022cf6cf203aecd587ec31b84bddc42bdb80d34ba09960e50afba085fdae6dfa4cca2f1664f6ccff95e1a7cdf5a3066f36827bd5a46c803932e678f4

  • SSDEEP

    12288:jh/yDN787IPelHo8BM2rMayvaD7Jz52548cRWipfx8BjaMtbG7nU:d28y2rMDaD7j2581ktijU

Malware Config

Extracted

Family

raccoon

Botnet

f315ee4f62223a1a93a6356368da46c66948e79b

Attributes
  • url4cnc

    https://telete.in/fupastjackson1

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 11f62ec14db4f5cfa9f64ff3e4eb2ff0
    .exe windows:6 windows x86 arch:x86

    35279f0bcb93fbb246a2ff5f9995bdc1


    Headers

    Imports

    Sections