General

  • Target

    9f89c8cffae82b4ce3af3181a1065db66c556fcd570a8964a016e47692af1994.exe

  • Size

    595KB

  • Sample

    241123-v67wmsvpck

  • MD5

    cb2eac57843718c29f216fbc0241d863

  • SHA1

    27287f1706de2c4a32c0ae4c36d42869989ac2d4

  • SHA256

    9f89c8cffae82b4ce3af3181a1065db66c556fcd570a8964a016e47692af1994

  • SHA512

    d157417465d3bb4438f9d1be69149d5f24a890e89b53542e4d0a2807eb59a3a9bb59da07f204b69458bc7417052c71834d81c3a2d81625f0105d748648c3f87c

  • SSDEEP

    12288:xFdi+7NvWv6lW4QSOxxU1MTtzl2BYQm97Un+U+5GMedLPPxjuD4b5VA:xLiwNz0V6CDByoG3PPxCDN

Malware Config

Extracted

Family

raccoon

Botnet

acea450e34e990b055ec3f61bbf5320fab082758

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      9f89c8cffae82b4ce3af3181a1065db66c556fcd570a8964a016e47692af1994.exe

    • Size

      595KB

    • MD5

      cb2eac57843718c29f216fbc0241d863

    • SHA1

      27287f1706de2c4a32c0ae4c36d42869989ac2d4

    • SHA256

      9f89c8cffae82b4ce3af3181a1065db66c556fcd570a8964a016e47692af1994

    • SHA512

      d157417465d3bb4438f9d1be69149d5f24a890e89b53542e4d0a2807eb59a3a9bb59da07f204b69458bc7417052c71834d81c3a2d81625f0105d748648c3f87c

    • SSDEEP

      12288:xFdi+7NvWv6lW4QSOxxU1MTtzl2BYQm97Un+U+5GMedLPPxjuD4b5VA:xLiwNz0V6CDByoG3PPxCDN

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks