General

  • Target

    fee5280c7bf410c7074a57a7a6b5bc83b24f49ba0d8cd3f6183ae7eb0e4eaa6a

  • Size

    480KB

  • Sample

    240826-f66agsxeqd

  • MD5

    0f40fa2ed60a07d93f6340c6f50bf0b2

  • SHA1

    f36922062c081877bc3beca9640bb6fc297dc03a

  • SHA256

    fee5280c7bf410c7074a57a7a6b5bc83b24f49ba0d8cd3f6183ae7eb0e4eaa6a

  • SHA512

    092338d395b024ab59a1adb84aca1e5e0afb8e0f040bfe0e8c4480ce55e1d47e288394c82eaaeb6130bc52997715ec05510bb14ef668afffe6f28212dbac198a

  • SSDEEP

    6144:YCvZauBEGlCeYKJnRYC+YelH2S+4nceeApc8bjU0t03zp4da+y7zFSbj/jQe:Lx8/eY2m3lXJcn0tYp49yfFYj/8

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

e593428d572f64087cbbaacf2f970ff1f26a86b7

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      fee5280c7bf410c7074a57a7a6b5bc83b24f49ba0d8cd3f6183ae7eb0e4eaa6a

    • Size

      480KB

    • MD5

      0f40fa2ed60a07d93f6340c6f50bf0b2

    • SHA1

      f36922062c081877bc3beca9640bb6fc297dc03a

    • SHA256

      fee5280c7bf410c7074a57a7a6b5bc83b24f49ba0d8cd3f6183ae7eb0e4eaa6a

    • SHA512

      092338d395b024ab59a1adb84aca1e5e0afb8e0f040bfe0e8c4480ce55e1d47e288394c82eaaeb6130bc52997715ec05510bb14ef668afffe6f28212dbac198a

    • SSDEEP

      6144:YCvZauBEGlCeYKJnRYC+YelH2S+4nceeApc8bjU0t03zp4da+y7zFSbj/jQe:Lx8/eY2m3lXJcn0tYp49yfFYj/8

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Enterprise v15

Tasks