Resubmissions

27/03/2025, 03:45

250327-ea4w4sw1et 10

27/03/2025, 03:26

250327-dzpcaayny7 10

General

  • Target

    e28a6d3bdcfdad9ff4c37e6c22c1a52018e5076ec65b128614bcf0e8eb711171_02510000.7z

  • Size

    242KB

  • MD5

    0cdadf17d2a5a7b19ac445a2d66d6f6b

  • SHA1

    94cb3c7247a1eee62ec633e86e1e8e8787cb1a19

  • SHA256

    157729c0f840c6452979a121b855d372b28b1c46d41e225dee690fa5ce60ed1c

  • SHA512

    ed810a38dbf1332e9b3d6d3cf24fa4429b6e6485064107d44199aaefe9127c9c265f04e8e7907022786c60adecabfe0dbcdeb902d10cced4f28ed59be66a75f6

  • SSDEEP

    6144:Ok/HR2Oa3A1EykiFcHpbzYJZXM02m7mYMw1iOMJ7nBBvzbp07W:7Hja3DyFGJ3YJwArfyBBvzbpj

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e28a6d3bdcfdad9ff4c37e6c22c1a52018e5076ec65b128614bcf0e8eb711171_02510000.7z
    .7z

    Password: infected

  • e28a6d3bdcfdad9ff4c37e6c22c1a52018e5076ec65b128614bcf0e8eb711171_02510000.bin
    .exe windows:6 windows x86 arch:x86

    Password: infected

    2f1bba23d3f31d886fd20c963bc55038


    Headers

    Imports

    Sections