General

  • Target

    d6b2e107ac7ba9cb55fceb901651519b

  • Size

    518KB

  • Sample

    240319-vzld3ahe79

  • MD5

    d6b2e107ac7ba9cb55fceb901651519b

  • SHA1

    a225e6ebcdc0a7b69e9fb588d1e88b3d576d8392

  • SHA256

    91eb4aa588c6607ad27fb9b43d61166230a225d8a4aa517d685af28ab4382a26

  • SHA512

    d417d7a8e0ee1565f5a70503e7fde1279da3bf4df7bc3dcb1c7d51b0790216a9e18e58b061fdae652f04feccfa57e5b8433b82a5c2fb34c7022394a0055feb3b

  • SSDEEP

    12288:+xNExf+83gnVZd3OOm9Fd/rL2qsdGG58D:ce28QnVZNOT9F5mGG58D

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

92be0387873e54dd629b9bfa972c3a9a88e6726c

Attributes
  • url4cnc

    https://t.me/gishsunsetman

rc4.plain
rc4.plain

Targets

    • Target

      d6b2e107ac7ba9cb55fceb901651519b

    • Size

      518KB

    • MD5

      d6b2e107ac7ba9cb55fceb901651519b

    • SHA1

      a225e6ebcdc0a7b69e9fb588d1e88b3d576d8392

    • SHA256

      91eb4aa588c6607ad27fb9b43d61166230a225d8a4aa517d685af28ab4382a26

    • SHA512

      d417d7a8e0ee1565f5a70503e7fde1279da3bf4df7bc3dcb1c7d51b0790216a9e18e58b061fdae652f04feccfa57e5b8433b82a5c2fb34c7022394a0055feb3b

    • SSDEEP

      12288:+xNExf+83gnVZd3OOm9Fd/rL2qsdGG58D:ce28QnVZNOT9F5mGG58D

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks