General

  • Target

    c3254d5e509aebef7fda585b67b455028f7a64ecf1608285689f1a6f11767eb5

  • Size

    528KB

  • Sample

    220515-1rsq3abbar

  • MD5

    06103116cbf15dd1740e742a38b208f9

  • SHA1

    250493f5cdb7d55334bde05281765d782fc84339

  • SHA256

    c3254d5e509aebef7fda585b67b455028f7a64ecf1608285689f1a6f11767eb5

  • SHA512

    66d7cf524ba590e22777733bde196e06db9d2d65641552c4fd0c5b16cf62421b820c95a869bc67ee5c5b02ac18ded154a3a79cf4d7a45824784848af7076e58e

Malware Config

Extracted

Family

raccoon

Botnet

f6222712727496f7b94c16d9d2d9a65a19562242

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1cZGDeh2ulSMYWksvfDDig27C6DMUljz_

rc4.plain
rc4.plain

Targets

    • Target

      c3254d5e509aebef7fda585b67b455028f7a64ecf1608285689f1a6f11767eb5

    • Size

      528KB

    • MD5

      06103116cbf15dd1740e742a38b208f9

    • SHA1

      250493f5cdb7d55334bde05281765d782fc84339

    • SHA256

      c3254d5e509aebef7fda585b67b455028f7a64ecf1608285689f1a6f11767eb5

    • SHA512

      66d7cf524ba590e22777733bde196e06db9d2d65641552c4fd0c5b16cf62421b820c95a869bc67ee5c5b02ac18ded154a3a79cf4d7a45824784848af7076e58e

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks