Resubmissions

24/03/2025, 04:00

250324-ekqr8swvay 10

24/03/2025, 03:39

250324-d71ehsv1cv 10

General

  • Target

    wotsuper_03750000 exe malware.7z

  • Size

    245KB

  • MD5

    8e8073a5dc27b051ff889ea1e9726613

  • SHA1

    369737d0c62649f9b4083182e7a8f4d87334e380

  • SHA256

    70c22158e5ab3c694c7910b07f621dc4eeb7cf678d9cb459ba766a766ea7c7ba

  • SHA512

    4e6733c7bfdadb793566f5173261bdc5df5896e61ba28f1d514c06abcd9c1dd6919b17521eb80d12daa89452d945b90b665c20c4eb61c42514fbe47701efb074

  • SSDEEP

    6144:gIAsAx+zPzLE+iqtVG7VFyuEdDiDia15533yBiw6+wRmi:gnxxgvVG7PH+a1vyBiw1i

Malware Config

Extracted

Family

raccoon

Botnet

4ea2de23519e3f57fa6e68e00db8cdfa44e74741

Attributes
  • url4cnc

    https://telete.in/char0nsevenll

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • wotsuper_03750000 exe malware.7z
    .7z

    Password: infected

  • wotsuper_03750000 exe.bin
    .exe windows:6 windows x86 arch:x86

    Password: infected

    fcdb6921dd7ec86f49d4d22626c7875c


    Headers

    Imports

    Sections