General

  • Target

    2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia

  • Size

    544KB

  • Sample

    250124-jd5p2axkev

  • MD5

    bccd7ee1ecfdc960bb93c174e458e9cb

  • SHA1

    0e4452d98dc1744003efccd3d07c30121d0d34ad

  • SHA256

    4a2aa1c96230767fd269d331e747c95662c041eea0eda1e2f460615fb6ea64d2

  • SHA512

    b6cee268576d1cdc61c50dff72bbd742e1afd41b13ef19f7d60e735d662a7e5979863bad7ce8d654675e059c19b504e6a2a7b8e1f7e39a280ff3c57b6c7dd608

  • SSDEEP

    12288:imV8bAHBatyrQ46L2oGCPh5eAEJ1+rCxjiN5d:imV8bVt+Q41pxJG5

Malware Config

Extracted

Family

raccoon

Botnet

faea3ab5ea06a40f0cc8f655e526972689ca1b1f

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1QQXAXArU8BU4kJZ6IBsSCCyLtmLftiOV

rc4.plain
rc4.plain

Targets

    • Target

      2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia

    • Size

      544KB

    • MD5

      bccd7ee1ecfdc960bb93c174e458e9cb

    • SHA1

      0e4452d98dc1744003efccd3d07c30121d0d34ad

    • SHA256

      4a2aa1c96230767fd269d331e747c95662c041eea0eda1e2f460615fb6ea64d2

    • SHA512

      b6cee268576d1cdc61c50dff72bbd742e1afd41b13ef19f7d60e735d662a7e5979863bad7ce8d654675e059c19b504e6a2a7b8e1f7e39a280ff3c57b6c7dd608

    • SSDEEP

      12288:imV8bAHBatyrQ46L2oGCPh5eAEJ1+rCxjiN5d:imV8bVt+Q41pxJG5

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks