General

  • Target

    3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0.exe

  • Size

    476KB

  • Sample

    240726-dbkdesvdrf

  • MD5

    cc715e675cf509c25aaa918dfe92d8c7

  • SHA1

    bdb9b6697f1af20b237cdebee07719ff611cd56c

  • SHA256

    3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0

  • SHA512

    5fe276ecd2ab44569684b6890439f751171a23905d50683e9cdb959d6d5e2c55b976484386caf258b662414c31c1fa54aa21cf43a5d29e106efcbd6053bf8441

  • SSDEEP

    12288:YVEJtDELG2OyT3/foiVTE7gjiQugC9yFsNJwoO:YVAELGiIibjugLoh

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Targets

    • Target

      3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0.exe

    • Size

      476KB

    • MD5

      cc715e675cf509c25aaa918dfe92d8c7

    • SHA1

      bdb9b6697f1af20b237cdebee07719ff611cd56c

    • SHA256

      3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0

    • SHA512

      5fe276ecd2ab44569684b6890439f751171a23905d50683e9cdb959d6d5e2c55b976484386caf258b662414c31c1fa54aa21cf43a5d29e106efcbd6053bf8441

    • SSDEEP

      12288:YVEJtDELG2OyT3/foiVTE7gjiQugC9yFsNJwoO:YVAELGiIibjugLoh

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks