General

  • Target

    fd57c141a84d273d30e3ee53bedbabd210bd8a5484fe0f22ec7f841a7482c16d

  • Size

    573KB

  • MD5

    93908b9cf486d6f46ad8cb47068f4b7e

  • SHA1

    f9916ec9fbeb611fc69716147f463998b9b7da1d

  • SHA256

    fd57c141a84d273d30e3ee53bedbabd210bd8a5484fe0f22ec7f841a7482c16d

  • SHA512

    914a9fbff70549266a84ccd65aaa18e21ae8d5d2cb9072074a98a05e6a15c331376798888833539031ff97b751b44ad38367288530e62f8e499d31536ed6cbb4

  • SSDEEP

    12288:D5ntsDk51T1v2AqWsmCsWZC6cm3mS5Osw4KT5uImXzsMAi8Wh5Qm6f:dntso1T1v2AVZXWZZqRzUDI

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

c021300d0074689fde86c87568e215c582272721

Attributes
  • url4cnc

    https://tttttt.me/ch0koalpengold

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fd57c141a84d273d30e3ee53bedbabd210bd8a5484fe0f22ec7f841a7482c16d
    .exe windows:6 windows x86 arch:x86

    51747c8f67e1906217336bcac3925924


    Headers

    Imports

    Sections