General

  • Target

    8c15ae5f09c63d6ea7d48b8497a825fdf91b8805834a5dbab6394dee13bf72f9

  • Size

    846KB

  • Sample

    210807-e6ylrqx76j

  • MD5

    806bb1d1c28e6c20050085ef2e8dc097

  • SHA1

    86f6d3cc05c61af777a3f2277036ea723597526c

  • SHA256

    8c15ae5f09c63d6ea7d48b8497a825fdf91b8805834a5dbab6394dee13bf72f9

  • SHA512

    06ac4ade5444df3770404f747d4f09d7d7646ae0e7f40b169c083524c127a15c7e2eb3ffbf64a26dc9e012b8def249f2425a31ae7bfef544398ecdd1519c4eaf

Malware Config

Extracted

Family

raccoon

Botnet

92be0387873e54dd629b9bfa972c3a9a88e6726c

Attributes
  • url4cnc

    https://t.me/gishsunsetman

rc4.plain
rc4.plain

Targets

    • Target

      8c15ae5f09c63d6ea7d48b8497a825fdf91b8805834a5dbab6394dee13bf72f9

    • Size

      846KB

    • MD5

      806bb1d1c28e6c20050085ef2e8dc097

    • SHA1

      86f6d3cc05c61af777a3f2277036ea723597526c

    • SHA256

      8c15ae5f09c63d6ea7d48b8497a825fdf91b8805834a5dbab6394dee13bf72f9

    • SHA512

      06ac4ade5444df3770404f747d4f09d7d7646ae0e7f40b169c083524c127a15c7e2eb3ffbf64a26dc9e012b8def249f2425a31ae7bfef544398ecdd1519c4eaf

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks