General

  • Target

    7efe9fc7329a78d32cf8c7f98f068566.zip

  • Size

    399KB

  • Sample

    240831-mn9crazala

  • MD5

    3aeb53b03fee4fcbbdbce91585a68f2b

  • SHA1

    c5ef9ecbd5e2fd28903ae791754bdf8f11e065ed

  • SHA256

    2f756f44c4ca3ae42f1933cb5989bdc189ef89a62895b3cd9dc3c9092cb57fd1

  • SHA512

    f1c74f931eabe479d7131717efdbc639d8676cb0715ddf11728b4783d5fde179cc796c508cdc2a679b29b1304c89412b74cb51f4a3e7a6b94408d071a011a42d

  • SSDEEP

    12288:w/dQSVlReoNQRfpTkjHK7PUDSbc2bzhLk9X:GJl8lpTkjHQPU92XhLk9X

Malware Config

Extracted

Family

raccoon

Botnet

f101b8d36e5dba77385a11565177c9403f6a2964

Attributes
  • url4cnc

    http://telegatt.top/mailware

    http://telegka.top/mailware

    http://telegin.top/mailware

    https://t.me/mailware

rc4.plain
rc4.plain

Targets

    • Target

      49209c0cd75b58e967570eb5a49e9ab2b1533d166c1009e56c242f8e06143ec9

    • Size

      561KB

    • MD5

      7efe9fc7329a78d32cf8c7f98f068566

    • SHA1

      af6b30e7ca4695453251f7d60b85a515004ee9f5

    • SHA256

      49209c0cd75b58e967570eb5a49e9ab2b1533d166c1009e56c242f8e06143ec9

    • SHA512

      0002322f51e4673001f2f619191818a1d8766b7a0808237bde07c3b8fbbe5cf945e648a65cc7f7363f8a93417edadd1d05abe2aa29963bda93e2ebe1e3cd3315

    • SSDEEP

      12288:BcW1HJ+I3MF7H2Jl7XOwIVN5j3vPJxXLT2CQoLm2v0vQGmDc:5JpJlAN93vPjn24mhvP

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Enterprise v15

Tasks