General

  • Target

    d0a8cb42c4e0709d80697689921ed8ab

  • Size

    634KB

  • Sample

    240317-mmvg7scd75

  • MD5

    d0a8cb42c4e0709d80697689921ed8ab

  • SHA1

    bc13f06b925338cc351ba1f44d1b27de10360ba1

  • SHA256

    35fc76dd32ea2678866d7aa9dcacd71093c79ef2578e413162a75615ade5e4dd

  • SHA512

    9a54e2b7bb061343881570945f9fe953574697eef49b52f79623ac565bbcf65549731519dd7918103bc39d7fbbad6b2f87dc56eb46041bba92968490d6d3f14a

  • SSDEEP

    12288:8IQ4XNM31bJIAbG4gDSghtId8GXPQSxT3k5h6r/kjPIwGAZkj:8teNM3IAbG4gD5h6yGXPLl0ireIwRZkj

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

1ff78aeef2c0f62b7e4dc0223a6b2d818b6965e5

Attributes
  • url4cnc

    https://telete.in/pussyluckystart

rc4.plain
rc4.plain

Targets

    • Target

      d0a8cb42c4e0709d80697689921ed8ab

    • Size

      634KB

    • MD5

      d0a8cb42c4e0709d80697689921ed8ab

    • SHA1

      bc13f06b925338cc351ba1f44d1b27de10360ba1

    • SHA256

      35fc76dd32ea2678866d7aa9dcacd71093c79ef2578e413162a75615ade5e4dd

    • SHA512

      9a54e2b7bb061343881570945f9fe953574697eef49b52f79623ac565bbcf65549731519dd7918103bc39d7fbbad6b2f87dc56eb46041bba92968490d6d3f14a

    • SSDEEP

      12288:8IQ4XNM31bJIAbG4gDSghtId8GXPQSxT3k5h6r/kjPIwGAZkj:8teNM3IAbG4gD5h6yGXPLl0ireIwRZkj

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks