General

  • Target

    c62e83b8601ed2d2dd224c692ab0501df3b1295d508ffd96db892c90b4b807dc

  • Size

    473KB

  • Sample

    240827-ecltba1enc

  • MD5

    1f743c28192e96d516fb6892bbbc9012

  • SHA1

    e7e42269226ee87f9cbf50af58a4f2954b391276

  • SHA256

    c62e83b8601ed2d2dd224c692ab0501df3b1295d508ffd96db892c90b4b807dc

  • SHA512

    71f02a04b18996123495b5c5c9c06043df70e563d8c818830d1a11e1e8303027867ce5aff8d420a827c89e9b4fa17a896eae2f59073f786ae433fe4c0b712b91

  • SSDEEP

    12288:gdgkyGW0qm4qRDhq1lHYPuEzeTym4bTgHBBRmr4Y:PlARtq1lYPuGeTyl2Bqr4Y

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Targets

    • Target

      c62e83b8601ed2d2dd224c692ab0501df3b1295d508ffd96db892c90b4b807dc

    • Size

      473KB

    • MD5

      1f743c28192e96d516fb6892bbbc9012

    • SHA1

      e7e42269226ee87f9cbf50af58a4f2954b391276

    • SHA256

      c62e83b8601ed2d2dd224c692ab0501df3b1295d508ffd96db892c90b4b807dc

    • SHA512

      71f02a04b18996123495b5c5c9c06043df70e563d8c818830d1a11e1e8303027867ce5aff8d420a827c89e9b4fa17a896eae2f59073f786ae433fe4c0b712b91

    • SSDEEP

      12288:gdgkyGW0qm4qRDhq1lHYPuEzeTym4bTgHBBRmr4Y:PlARtq1lYPuGeTyl2Bqr4Y

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Enterprise v15

Tasks