General

  • Target

    229b20fcfbcfab8cf7e4a65ed0745695

  • Size

    1.4MB

  • Sample

    231231-bj98psebe8

  • MD5

    229b20fcfbcfab8cf7e4a65ed0745695

  • SHA1

    4b12a3e63834b7ce890a88a218955c634de068cd

  • SHA256

    7177bb89728733ebe11671d460dd68ae73f2485b92bfc58587ed9379261492dc

  • SHA512

    ffa39d194b7013235939f839156316846aea3bb59eaea6f1f7e9b84369c94d98180ae7c60e61bf66d604bbeb13b1fb4d8180843f1febb236c0f844fda51617a3

  • SSDEEP

    24576:JMAV21MdCnv/T4F8fGEWBbH4Za+3sTYgdMpQ/ZriiRF:JXV2WdY74lES4ZP8TJMQ/Qk

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

a209f001fa31695840427e137517f126fcaa82e9

Attributes
  • url4cnc

    https://tttttt.me/h_nn_mm_1

rc4.plain
rc4.plain

Targets

    • Target

      229b20fcfbcfab8cf7e4a65ed0745695

    • Size

      1.4MB

    • MD5

      229b20fcfbcfab8cf7e4a65ed0745695

    • SHA1

      4b12a3e63834b7ce890a88a218955c634de068cd

    • SHA256

      7177bb89728733ebe11671d460dd68ae73f2485b92bfc58587ed9379261492dc

    • SHA512

      ffa39d194b7013235939f839156316846aea3bb59eaea6f1f7e9b84369c94d98180ae7c60e61bf66d604bbeb13b1fb4d8180843f1febb236c0f844fda51617a3

    • SSDEEP

      24576:JMAV21MdCnv/T4F8fGEWBbH4Za+3sTYgdMpQ/ZriiRF:JXV2WdY74lES4ZP8TJMQ/Qk

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks