General

  • Target

    d43a84644800b0c4895b5a632e4f2fc9

  • Size

    1.4MB

  • Sample

    240318-w8437sfc66

  • MD5

    d43a84644800b0c4895b5a632e4f2fc9

  • SHA1

    7d737500abf0e282b6d3787af155595e9ca698e0

  • SHA256

    0f128bf1457f6483c13dd8bd644d91b1bf7959fb5063b06d6f7d03a5b9df2eed

  • SHA512

    cd7f0f8bd1ca03f5266eda71bcaa13b5199dbc910dbf99f963c3f5f9192449c7ed7c9de7bd19d50643609c50627780340c2037d542b482ebc939c4c51fdb322d

  • SSDEEP

    24576:hWgNt0p7EXmlr0cEOLZ8rwkR8PYiT6oguY7cRV9FYr1GbfLqN:7CRE2/VLZ4ncRVhfmN

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

22b0138467291ef5318d3fae09ecd482e5ca2676

Attributes
  • url4cnc

    https://telete.in/forkmaster123

rc4.plain
rc4.plain

Targets

    • Target

      d43a84644800b0c4895b5a632e4f2fc9

    • Size

      1.4MB

    • MD5

      d43a84644800b0c4895b5a632e4f2fc9

    • SHA1

      7d737500abf0e282b6d3787af155595e9ca698e0

    • SHA256

      0f128bf1457f6483c13dd8bd644d91b1bf7959fb5063b06d6f7d03a5b9df2eed

    • SHA512

      cd7f0f8bd1ca03f5266eda71bcaa13b5199dbc910dbf99f963c3f5f9192449c7ed7c9de7bd19d50643609c50627780340c2037d542b482ebc939c4c51fdb322d

    • SSDEEP

      24576:hWgNt0p7EXmlr0cEOLZ8rwkR8PYiT6oguY7cRV9FYr1GbfLqN:7CRE2/VLZ4ncRVhfmN

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks