General

  • Target

    c5c4e9b433d12cde350482ac06a1439e

  • Size

    913KB

  • Sample

    240313-nnl3wsdg48

  • MD5

    c5c4e9b433d12cde350482ac06a1439e

  • SHA1

    5628f6766caeebd0c2be8d9f30ea74c563414a73

  • SHA256

    9c50773d76dde4dcb14412b9054d22267425a577040c01a6afba8cc2833f7cb9

  • SHA512

    e2376120cffc8fbdb3a703abf6f76f29c83e37df924f0681b708e05ecda5d1c1d465f5cae40bad19eeed68010835621aabebba98879d69d69aa9ece1317e4de6

  • SSDEEP

    24576:q+4c3+VbG0AOOy8Gwa/nUhSYhgTuwWggp0FvzK:q+cs0lOwv/c7Xp0F

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

d7b6e0cee1cd813ad40c812cf45171cf0360e249

Attributes
  • url4cnc

    https://telete.in/mimipanera11

rc4.plain
rc4.plain

Targets

    • Target

      c5c4e9b433d12cde350482ac06a1439e

    • Size

      913KB

    • MD5

      c5c4e9b433d12cde350482ac06a1439e

    • SHA1

      5628f6766caeebd0c2be8d9f30ea74c563414a73

    • SHA256

      9c50773d76dde4dcb14412b9054d22267425a577040c01a6afba8cc2833f7cb9

    • SHA512

      e2376120cffc8fbdb3a703abf6f76f29c83e37df924f0681b708e05ecda5d1c1d465f5cae40bad19eeed68010835621aabebba98879d69d69aa9ece1317e4de6

    • SSDEEP

      24576:q+4c3+VbG0AOOy8Gwa/nUhSYhgTuwWggp0FvzK:q+cs0lOwv/c7Xp0F

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks