General

  • Target

    b6b5f7d77441d6fcb774f616d2861372

  • Size

    583KB

  • MD5

    b6b5f7d77441d6fcb774f616d2861372

  • SHA1

    977f7c4175205a14b0964f7abf10ffbfcb8f18df

  • SHA256

    e2cf4afbc68de96784c1de3623ec6a6eeb9a3a9886db3dc3eddb3e845151291b

  • SHA512

    7f850131898d532e0e420ee2cb84e6871abb136cb8054d409d7a701f470d26131ec394d6efc90365055815ccb89fc20b37f7771711b36929812374c76d9f6837

  • SSDEEP

    12288:7RaXb/FXVHMBhx/D8WlhVe2f1yt0uWWgaRjUut26sFh3Gac5B8/e:7IXbzHMBhxbhrVeOlflo4/e

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

2d1dbfc0a9d34b2805ce2631013013bd404fad75

Attributes
  • url4cnc

    https://telete.in/mik3romarios

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b6b5f7d77441d6fcb774f616d2861372
    .exe windows:6 windows x86 arch:x86

    5bccc4ddaaaa65b3c4a43f5df51c1a02


    Headers

    Imports

    Sections