General

  • Target

    d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83

  • Size

    714KB

  • Sample

    220228-1htxrsgfam

  • MD5

    c9acb5656d5c2fea03a1d840bce3b318

  • SHA1

    ef13643a9104dd7e8f83e2bb0465d63bfd29594f

  • SHA256

    d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83

  • SHA512

    00180fcb0985cbba2f4feb2da2262b374518acaeb7c4ccae55ca9a4fb715793063b1a64ac704e996bee54846b94185fe7f35cc5d9bda1aefcb291bd75b0f7485

Malware Config

Extracted

Family

raccoon

Botnet

1c0fad6805a0f65d7b597130eb9f089ffbe9857d

Attributes
  • url4cnc

    http://194.180.191.241/capibar

    http://103.155.93.35/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Targets

    • Target

      d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83

    • Size

      714KB

    • MD5

      c9acb5656d5c2fea03a1d840bce3b318

    • SHA1

      ef13643a9104dd7e8f83e2bb0465d63bfd29594f

    • SHA256

      d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83

    • SHA512

      00180fcb0985cbba2f4feb2da2262b374518acaeb7c4ccae55ca9a4fb715793063b1a64ac704e996bee54846b94185fe7f35cc5d9bda1aefcb291bd75b0f7485

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)

      suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks