General

  • Target

    242a445f36c2d1de50800e43c54fcac18b1f56dbb82f2bb454c1742f8576260e.exe

  • Size

    512KB

  • Sample

    241123-eksltsxph1

  • MD5

    a061047bde98fbc085243a50cba4c88f

  • SHA1

    ddad8d3c9b67c8309a6b9c6f443130606679d821

  • SHA256

    242a445f36c2d1de50800e43c54fcac18b1f56dbb82f2bb454c1742f8576260e

  • SHA512

    d222d1fa730fb2946512fef6d22f7da66cf5a6c11bf6ff7ef1b53910fc143b2cf84f112afc25ddc74eba77ad26241e9024aa71f3a3dc7b7aac5025cf65915b09

  • SSDEEP

    12288:AkuuSP4H1DZXw6/yEMAmXDq54PWCks2D/FAvfSvwZGEX8cf:AtlCbbK1DzXPWnTFafSosEd

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      242a445f36c2d1de50800e43c54fcac18b1f56dbb82f2bb454c1742f8576260e.exe

    • Size

      512KB

    • MD5

      a061047bde98fbc085243a50cba4c88f

    • SHA1

      ddad8d3c9b67c8309a6b9c6f443130606679d821

    • SHA256

      242a445f36c2d1de50800e43c54fcac18b1f56dbb82f2bb454c1742f8576260e

    • SHA512

      d222d1fa730fb2946512fef6d22f7da66cf5a6c11bf6ff7ef1b53910fc143b2cf84f112afc25ddc74eba77ad26241e9024aa71f3a3dc7b7aac5025cf65915b09

    • SSDEEP

      12288:AkuuSP4H1DZXw6/yEMAmXDq54PWCks2D/FAvfSvwZGEX8cf:AtlCbbK1DzXPWnTFafSosEd

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks