General

  • Target

    cdf1d36e5d566314e0f5f09b5bd32845

  • Size

    487KB

  • Sample

    240316-njlassaa4w

  • MD5

    cdf1d36e5d566314e0f5f09b5bd32845

  • SHA1

    cc31a7ff37220a8e715450cb8a857be907c44d0d

  • SHA256

    4507bfc9e523a0d650c1db2ab088af56de093bde9af54687deeaebe4a3e014c1

  • SHA512

    8c3a7de502efed9372396be6386d4166a396411a3748094d42c67c3c55c2d61308ad8239db7e80a23ec2b52d1bf9ee43ad2d3fe87d67a079c1298d6a847273fd

  • SSDEEP

    12288:gDCBS+Tf513C//CVgG56h+PCQXNQCYM5muZOb:gQ33C//C+gPC9M5muZOb

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

b19ab3b3bd39b9aebee9d40611a5758426085c48

Attributes
  • url4cnc

    https://telete.in/indochipropertw

rc4.plain
rc4.plain

Targets

    • Target

      cdf1d36e5d566314e0f5f09b5bd32845

    • Size

      487KB

    • MD5

      cdf1d36e5d566314e0f5f09b5bd32845

    • SHA1

      cc31a7ff37220a8e715450cb8a857be907c44d0d

    • SHA256

      4507bfc9e523a0d650c1db2ab088af56de093bde9af54687deeaebe4a3e014c1

    • SHA512

      8c3a7de502efed9372396be6386d4166a396411a3748094d42c67c3c55c2d61308ad8239db7e80a23ec2b52d1bf9ee43ad2d3fe87d67a079c1298d6a847273fd

    • SSDEEP

      12288:gDCBS+Tf513C//CVgG56h+PCQXNQCYM5muZOb:gQ33C//C+gPC9M5muZOb

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks