General

  • Target

    ce6f0ae83b8633dca1eb926b922c1f95b0cfb6f7701705c5032e025434f20dc6

  • Size

    791KB

  • Sample

    220224-kvsmgadgek

  • MD5

    fab6367673f63857ed3a74731657c3df

  • SHA1

    0f7aba66895dede489874beeb1e77bc9219bb2d6

  • SHA256

    ce6f0ae83b8633dca1eb926b922c1f95b0cfb6f7701705c5032e025434f20dc6

  • SHA512

    876039c14aff8e1675af32d68e909dc31c3057f0b59072ccb7e8fe7a697bb1c751f85dbde5103fb4a64e635981480ac278f134dee9a28d81c99249c24dbccc5d

Malware Config

Extracted

Family

raccoon

Botnet

1c0fad6805a0f65d7b597130eb9f089ffbe9857d

Attributes
  • url4cnc

    http://194.180.191.241/capibar

    http://103.155.93.35/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Targets

    • Target

      ce6f0ae83b8633dca1eb926b922c1f95b0cfb6f7701705c5032e025434f20dc6

    • Size

      791KB

    • MD5

      fab6367673f63857ed3a74731657c3df

    • SHA1

      0f7aba66895dede489874beeb1e77bc9219bb2d6

    • SHA256

      ce6f0ae83b8633dca1eb926b922c1f95b0cfb6f7701705c5032e025434f20dc6

    • SHA512

      876039c14aff8e1675af32d68e909dc31c3057f0b59072ccb7e8fe7a697bb1c751f85dbde5103fb4a64e635981480ac278f134dee9a28d81c99249c24dbccc5d

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)

      suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks