General

  • Target

    2024090619e613e9aa3f540186a4c3ecfd666ca6avoslockercobaltstrikeraccoonstealer

  • Size

    564KB

  • MD5

    19e613e9aa3f540186a4c3ecfd666ca6

  • SHA1

    ad2b594e16ab34651fa4d648cbb845b6b16cbe0a

  • SHA256

    6de47408f9e5b3ad65bf4e33a90c39c76ba459837f8b2171e295df23ad5724c3

  • SHA512

    e87e02fb81d4e3fd6615dec74e9c506a7c0a01a2f9310688a2ede17f3082f242efd8ad7bbe872139fcd0235547aae1050b5cffa8651a640ea99c558b72040689

  • SSDEEP

    12288:TzB2UjHsN8Bjc1vVmQxbFv3oVIhTfAKfo3Ro/iQXzX1I8oRD7BdrDb:TzB2UjHsN8RMm6R3ou/fouHlbgnrD

Malware Config

Extracted

Family

raccoon

Version

1.8.2

Botnet

a88535c74ffd32b2b194b8f5512e3cc6a1ebc76a

Attributes
  • url4cnc

    http://telemirror.top/hellobyegain

    http://tgmirror.top/hellobyegain

    http://telegatt.top/hellobyegain

    http://telegka.top/hellobyegain

    http://telegin.top/hellobyegain

    https://t.me/hellobyegain

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024090619e613e9aa3f540186a4c3ecfd666ca6avoslockercobaltstrikeraccoonstealer
    .exe windows:6 windows x86 arch:x86

    2f1bba23d3f31d886fd20c963bc55038


    Headers

    Imports

    Sections