General

  • Target

    c4fcb97e9635fdfaa31d3d9566cecea4

  • Size

    2.2MB

  • Sample

    240313-e7gsvaef55

  • MD5

    c4fcb97e9635fdfaa31d3d9566cecea4

  • SHA1

    7b935560a4a90c2fee2c3454cf7840f114c63600

  • SHA256

    37b701a787a3ee7b5f4e58bc2cc7f4ea3fb1552a376f3b60c79c638a30e53b7d

  • SHA512

    e8878a5e7f6899668f4d6c1121d0fe09324ea47b843883999bb4f4a166364075dfe07ab9b1a0133fa86703dd7c8195e2de6c2b70974625b4d45dfe1c521fd9a8

  • SSDEEP

    49152:oKoHcIV2QVj49QlFg6WVJLu830aeJvLZrok:oKoHcZQVjpFgk83iJvLZrok

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

7cd90ae238d66db40c22016c38bbfed9c6a5fb40

Attributes
  • url4cnc

    https://telete.in/jredmankun

rc4.plain
rc4.plain

Targets

    • Target

      c4fcb97e9635fdfaa31d3d9566cecea4

    • Size

      2.2MB

    • MD5

      c4fcb97e9635fdfaa31d3d9566cecea4

    • SHA1

      7b935560a4a90c2fee2c3454cf7840f114c63600

    • SHA256

      37b701a787a3ee7b5f4e58bc2cc7f4ea3fb1552a376f3b60c79c638a30e53b7d

    • SHA512

      e8878a5e7f6899668f4d6c1121d0fe09324ea47b843883999bb4f4a166364075dfe07ab9b1a0133fa86703dd7c8195e2de6c2b70974625b4d45dfe1c521fd9a8

    • SSDEEP

      49152:oKoHcIV2QVj49QlFg6WVJLu830aeJvLZrok:oKoHcZQVjpFgk83iJvLZrok

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks