General

  • Target

    2abbfbbf33d262f6ae44dd83df8d3e30

  • Size

    565KB

  • MD5

    2abbfbbf33d262f6ae44dd83df8d3e30

  • SHA1

    665eb97ed95214627a1fb0e06ee5d3b7fe080142

  • SHA256

    a17024fcd2de08eaddf6e1a317c3a9106410cd8d536fd7e9520899370f97e69c

  • SHA512

    11d4332c339b70ac84228d78942755e8c3ab252da8794ea875d6cdc4e8913dc508213fa47f9793e0b3b0756e6a805ef7d6d0e8449bded5b7c7766e04677e3c08

  • SSDEEP

    12288:jh/yDN787IPelHo8BM2rMayvaD7Jz52548cRWipfx8BjaMQKbG7nU:d28y2rMDaD7j2581kQKijU

Malware Config

Extracted

Family

raccoon

Botnet

d2e85046da19a1e3b943871938967b50f54c1648

Attributes
  • url4cnc

    https://telete.in/oparocketsience

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2abbfbbf33d262f6ae44dd83df8d3e30
    .exe windows:6 windows x86 arch:x86

    35279f0bcb93fbb246a2ff5f9995bdc1


    Headers

    Imports

    Sections