General

  • Target

    43c4fecf54d576745e1cc5908a1e9b700e2b61eb4618d4fcead5bffb928ff9a5

  • Size

    450KB

  • Sample

    240903-v5kdystblb

  • MD5

    c656011d43b04655d22ea28b8ff08638

  • SHA1

    d41ff53b4c52db75a0a98b176d4278b07ace95c1

  • SHA256

    43c4fecf54d576745e1cc5908a1e9b700e2b61eb4618d4fcead5bffb928ff9a5

  • SHA512

    1a120e858840bed4cc2ca2449f2a7681603fc661a794176fd9251f457a00ab63071b398fa77d74a031b8847b20bfb94b5dc66a22b67bba074e8bab6210060410

  • SSDEEP

    12288:xKwU9IJDDQ9opWln5lUvxmFj4cewWTkqg4ArDl1sQF:xKcJDMOpWGvxa4UqwrAg

Malware Config

Extracted

Family

raccoon

Botnet

cbc29c9ccf1e04407d2e6513fba49a5c24434afe

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      81f6f29613a28ada6beccd7455b81e42e87d95ea13bd8cbcd35cdfd09f706e17

    • Size

      542KB

    • MD5

      3d2517f7ac951a1ccbd61bd0310966b5

    • SHA1

      b24ef373276d7b38eed507097ae72b6896d112df

    • SHA256

      81f6f29613a28ada6beccd7455b81e42e87d95ea13bd8cbcd35cdfd09f706e17

    • SHA512

      107d62ec291201c2787fd7eba2db4fddefc69373df2fb13c3db4ba8f780c0560f488d218f79247b34f333babecdb69ef94c3b141ab2c8d4309ac99c1a56ca11c

    • SSDEEP

      12288:ToWlFr1qkahZRjKbbrz4BovZbPCBtUd3rPZJwZGEX8cA0/MP:T1dP0KfYBo9PUtmhysEv6

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Enterprise v15

Tasks