General

  • Target

    d87c5795515f51f84bf1bdea20437c5e6259d7032939da57827b468478ba783b.exe

  • Size

    556KB

  • Sample

    250212-pph83a1mbm

  • MD5

    2b9978174429cd177ee8ac3203dc19a5

  • SHA1

    002e80b2e3523f0fda72ab865eb469b5eb422390

  • SHA256

    d87c5795515f51f84bf1bdea20437c5e6259d7032939da57827b468478ba783b

  • SHA512

    f9a8881141d064e4cf6f86e2acbbd198226b048e427e2fa166c037667674313e6f1d9dfc3e7df581f5ede14d1b2c5e01cf9272bb06dcb543c0131bead6112440

  • SSDEEP

    12288:afY1JPOOlNQLRxrcwe5Bq+EASvXLFlNLcr45bptSrWRAZXTF:afKPOWQMBwjPNk4wXTF

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

a5853b5c02e94f46d8c8309106de23b7332e83d5

Attributes
  • url4cnc

    https://telete.in/hsbogdan

rc4.plain
rc4.plain

Targets

    • Target

      d87c5795515f51f84bf1bdea20437c5e6259d7032939da57827b468478ba783b.exe

    • Size

      556KB

    • MD5

      2b9978174429cd177ee8ac3203dc19a5

    • SHA1

      002e80b2e3523f0fda72ab865eb469b5eb422390

    • SHA256

      d87c5795515f51f84bf1bdea20437c5e6259d7032939da57827b468478ba783b

    • SHA512

      f9a8881141d064e4cf6f86e2acbbd198226b048e427e2fa166c037667674313e6f1d9dfc3e7df581f5ede14d1b2c5e01cf9272bb06dcb543c0131bead6112440

    • SSDEEP

      12288:afY1JPOOlNQLRxrcwe5Bq+EASvXLFlNLcr45bptSrWRAZXTF:afKPOWQMBwjPNk4wXTF

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Downloads MZ/PE file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks