General

  • Target

    79f1292c3060aeb8a01089d9e976375018ff77bbd54d5d6b532f0fa7d9d96cde.exe

  • Size

    557KB

  • Sample

    250117-ey47saspbk

  • MD5

    400bf723364249fb4c9b685dc73e379f

  • SHA1

    83d64194be548b46fd457ae338a770181680b4ef

  • SHA256

    79f1292c3060aeb8a01089d9e976375018ff77bbd54d5d6b532f0fa7d9d96cde

  • SHA512

    d5e85efcb18ba03fdd9a0c292e48a67003604b4ef722df925cfb8c0f52d01f64b3a70b19d859eb7d56b3b47762d840967f36fcd35555ebcf6386c25058bb8d1e

  • SSDEEP

    12288:w1MZ2jSlp3mcO2JH1bWxR78NPicLLEHAb8BpQ4Ym0sEE03mi9kmc:w1RjC3DTI8NPnLLJ+pQ4YmZiHkmc

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

a5853b5c02e94f46d8c8309106de23b7332e83d5

Attributes
  • url4cnc

    https://telete.in/hsbogdan

rc4.plain
rc4.plain

Targets

    • Target

      79f1292c3060aeb8a01089d9e976375018ff77bbd54d5d6b532f0fa7d9d96cde.exe

    • Size

      557KB

    • MD5

      400bf723364249fb4c9b685dc73e379f

    • SHA1

      83d64194be548b46fd457ae338a770181680b4ef

    • SHA256

      79f1292c3060aeb8a01089d9e976375018ff77bbd54d5d6b532f0fa7d9d96cde

    • SHA512

      d5e85efcb18ba03fdd9a0c292e48a67003604b4ef722df925cfb8c0f52d01f64b3a70b19d859eb7d56b3b47762d840967f36fcd35555ebcf6386c25058bb8d1e

    • SSDEEP

      12288:w1MZ2jSlp3mcO2JH1bWxR78NPicLLEHAb8BpQ4Ym0sEE03mi9kmc:w1RjC3DTI8NPnLLJ+pQ4YmZiHkmc

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks