General

  • Target

    dcb9ddc6f65a40b16496a63772a10e53

  • Size

    572KB

  • Sample

    240321-1y3jvade9y

  • MD5

    dcb9ddc6f65a40b16496a63772a10e53

  • SHA1

    c406c9b495b92ba8bce7bf5f3070402d9f01b514

  • SHA256

    0a0f61e68e196b10f8ad643d2fcf5402af3dedf430f7fe2fddb80cfc038e9792

  • SHA512

    db19b513c703b8d8e6430d2c2c2e25b28c331e980bee1a9c7576366d575cb6df2faf7b4fdf7190634576f53341f0dae8ad943b2ce431d9a550a22911767024d8

  • SSDEEP

    12288:1gG90TdElJBNKC9KRczx50dLZQpXqhoDmpH7E73os7KkHPs9qI9:1gajNKC9CrjoiR7kN7O9qS

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

16a39305e75d7034b96e725c3f1dd72b36d25c64

Attributes
  • url4cnc

    https://telete.in/hi3krasav4ik

rc4.plain
rc4.plain

Targets

    • Target

      dcb9ddc6f65a40b16496a63772a10e53

    • Size

      572KB

    • MD5

      dcb9ddc6f65a40b16496a63772a10e53

    • SHA1

      c406c9b495b92ba8bce7bf5f3070402d9f01b514

    • SHA256

      0a0f61e68e196b10f8ad643d2fcf5402af3dedf430f7fe2fddb80cfc038e9792

    • SHA512

      db19b513c703b8d8e6430d2c2c2e25b28c331e980bee1a9c7576366d575cb6df2faf7b4fdf7190634576f53341f0dae8ad943b2ce431d9a550a22911767024d8

    • SSDEEP

      12288:1gG90TdElJBNKC9KRczx50dLZQpXqhoDmpH7E73os7KkHPs9qI9:1gajNKC9CrjoiR7kN7O9qS

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Enterprise v15

Tasks