General

  • Target

    c3886975ff903f64ce62670a98c31638

  • Size

    1.4MB

  • Sample

    240312-q7eh9scd32

  • MD5

    c3886975ff903f64ce62670a98c31638

  • SHA1

    fdd6669b1de212e0641dbacdc370be05f93a1b6c

  • SHA256

    e861a034e8de4c72d7087a5d86848bf2b7ce0285e51a3f443746f493aaf68308

  • SHA512

    12fa1340042cd29b2aa558d79f157c80ba657bcf7e50642c206f314fea7dee216046ceee941327c39fc29f53e0ca8c94143ef048865e07b6021e100a9b15c7a5

  • SSDEEP

    24576:9CPxN3/bIWVmfw+iKZNVLJhXT+fQl+JnkV6qjnPMqbAA:Qn3/bfVmfw+iAJcfQl+mP/

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

6c8529645e657d45f7bbccc3dda99beb45edd413

Attributes
  • url4cnc

    https://telete.in/too0l12y

rc4.plain
rc4.plain

Targets

    • Target

      c3886975ff903f64ce62670a98c31638

    • Size

      1.4MB

    • MD5

      c3886975ff903f64ce62670a98c31638

    • SHA1

      fdd6669b1de212e0641dbacdc370be05f93a1b6c

    • SHA256

      e861a034e8de4c72d7087a5d86848bf2b7ce0285e51a3f443746f493aaf68308

    • SHA512

      12fa1340042cd29b2aa558d79f157c80ba657bcf7e50642c206f314fea7dee216046ceee941327c39fc29f53e0ca8c94143ef048865e07b6021e100a9b15c7a5

    • SSDEEP

      24576:9CPxN3/bIWVmfw+iKZNVLJhXT+fQl+JnkV6qjnPMqbAA:Qn3/bfVmfw+iAJcfQl+mP/

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks