General

  • Target

    4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563

  • Size

    220KB

  • Sample

    221016-vzwvsshger

  • MD5

    7e0ca4c3e31519b2b599f40081cf5f12

  • SHA1

    cdc02bb8f8752e827dfe84befddcbdd4696cd296

  • SHA256

    4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563

  • SHA512

    f249f30dae52bae904572b331cb96d39983e9c15778c1f07d7374f2eeabc8667f65b4d0f8cbf6c3c623b9e114df90fd479c6dee64ccee419de7529f3678e9000

  • SSDEEP

    3072:tXpQbHChLT8QwarMG57rwHlfrHXV1522dWzJnyGS0Ku7HzEi2N27:paHChLLrMJrHXV+ryGS0362

Malware Config

Extracted

Family

raccoon

Botnet

63267bc2317b9849c2d512a4e16b0f3b

C2

http://shettester1000.com/

rc4.plain

Targets

    • Target

      4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563

    • Size

      220KB

    • MD5

      7e0ca4c3e31519b2b599f40081cf5f12

    • SHA1

      cdc02bb8f8752e827dfe84befddcbdd4696cd296

    • SHA256

      4a24fafb04de2a258aba84281ddc739275c05073894424a1de48e1ca95782563

    • SHA512

      f249f30dae52bae904572b331cb96d39983e9c15778c1f07d7374f2eeabc8667f65b4d0f8cbf6c3c623b9e114df90fd479c6dee64ccee419de7529f3678e9000

    • SSDEEP

      3072:tXpQbHChLT8QwarMG57rwHlfrHXV1522dWzJnyGS0Ku7HzEi2N27:paHChLLrMJrHXV+ryGS0362

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks