General

  • Target

    4aa1e343c1b0f9e5ade449ae7ae63cc4.exe

  • Size

    1.4MB

  • Sample

    221006-17cd1sahf6

  • MD5

    4aa1e343c1b0f9e5ade449ae7ae63cc4

  • SHA1

    377daa11190974f3d6eb166063b28bdfc07f2b7e

  • SHA256

    06b2f4503ff44aeb98aefb8f65f5392c7b90f1ca8dc618a249b866914590a40f

  • SHA512

    23858123c021809e25f819e28a10ee20dffe4b5d5d607a989edd5723df7c2fb8a1fe5a78a67ca8dfe1ad5cfe4a3d81ae8354b77214155119f6687298c0766d68

  • SSDEEP

    24576:6UbwxnD9nhdeyWHy9t2GAYq+yo61j1b/pZWv6ARIFRd9iACg6teNf:VwxDdeyWnG2BFiqJCg6M

Malware Config

Extracted

Family

raccoon

Botnet

9b19cf60d9bdf65b8a2495aa965456c3

C2

http://5.2.70.65/

rc4.plain

Targets

    • Target

      4aa1e343c1b0f9e5ade449ae7ae63cc4.exe

    • Size

      1.4MB

    • MD5

      4aa1e343c1b0f9e5ade449ae7ae63cc4

    • SHA1

      377daa11190974f3d6eb166063b28bdfc07f2b7e

    • SHA256

      06b2f4503ff44aeb98aefb8f65f5392c7b90f1ca8dc618a249b866914590a40f

    • SHA512

      23858123c021809e25f819e28a10ee20dffe4b5d5d607a989edd5723df7c2fb8a1fe5a78a67ca8dfe1ad5cfe4a3d81ae8354b77214155119f6687298c0766d68

    • SSDEEP

      24576:6UbwxnD9nhdeyWHy9t2GAYq+yo61j1b/pZWv6ARIFRd9iACg6teNf:VwxDdeyWnG2BFiqJCg6M

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks