General

  • Target

    f00d0bbe87969d9abf8bb77f954e21e908768b4eaeae3fdf6d300977103cc1dcN.exe

  • Size

    557KB

  • Sample

    250117-bvyztaylap

  • MD5

    b7ff82f09e8d825b4e41a49fd4f1d890

  • SHA1

    d6e3ea88ad84612655c2e5a92e77814638357d3c

  • SHA256

    f00d0bbe87969d9abf8bb77f954e21e908768b4eaeae3fdf6d300977103cc1dc

  • SHA512

    01286f1874e01cc56d7631b80e1816e28ee3a2a7d0985ea3a9df1e6b3f35951b897c9d602bd8464805ee10c41addc0ef9956070c7a881db530ec64031359c8fd

  • SSDEEP

    12288:w1MZ2jSlp3mcO2JH1bWxR78NPicLLEHAb8BpQ4Ym0sEE03mi9km:w1RjC3DTI8NPnLLJ+pQ4YmZiHkm

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

a5853b5c02e94f46d8c8309106de23b7332e83d5

Attributes
  • url4cnc

    https://telete.in/hsbogdan

rc4.plain
rc4.plain

Targets

    • Target

      f00d0bbe87969d9abf8bb77f954e21e908768b4eaeae3fdf6d300977103cc1dcN.exe

    • Size

      557KB

    • MD5

      b7ff82f09e8d825b4e41a49fd4f1d890

    • SHA1

      d6e3ea88ad84612655c2e5a92e77814638357d3c

    • SHA256

      f00d0bbe87969d9abf8bb77f954e21e908768b4eaeae3fdf6d300977103cc1dc

    • SHA512

      01286f1874e01cc56d7631b80e1816e28ee3a2a7d0985ea3a9df1e6b3f35951b897c9d602bd8464805ee10c41addc0ef9956070c7a881db530ec64031359c8fd

    • SSDEEP

      12288:w1MZ2jSlp3mcO2JH1bWxR78NPicLLEHAb8BpQ4Ym0sEE03mi9km:w1RjC3DTI8NPnLLJ+pQ4YmZiHkm

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks