General

  • Target

    202405242aef499b5660a5c8b594e4109c7d099favoslockercobaltstrikeraccoonstealer

  • Size

    572KB

  • MD5

    2aef499b5660a5c8b594e4109c7d099f

  • SHA1

    ac1897f71a57b96139cd26b48c503337cea54d35

  • SHA256

    b9435603daa463622fd46d957c853bdf6ee7610537c759e44d372222315d16ca

  • SHA512

    8d28c16656a62e364beac8df75302d4cd9c6e524d12bebc9f851db76c7c7669af91a4c82d12dbb9499df280b07ef77745baa78ddf4b257860851d79f9d55892b

  • SSDEEP

    12288:QNlFn8ArT3Z/N+k8kfHax9WZi70WvlRdudnjrTJuIms327iFCUrxC3QO:cF3TZ/N+k8K6DWZ0clNF/9C3QO

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

75fbe127769a03ab235bd172a881a419ea43e573

Attributes
  • url4cnc

    https://telete.in/h_hitesh_1

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202405242aef499b5660a5c8b594e4109c7d099favoslockercobaltstrikeraccoonstealer
    .exe windows:6 windows x86 arch:x86

    51747c8f67e1906217336bcac3925924


    Headers

    Imports

    Sections