General

  • Target

    9d91cbc0bff07a1c1749886482c8defb287c1a2528e60d6f7100e6030470c482.exe

  • Size

    2.5MB

  • Sample

    221019-vlxj6sghd5

  • MD5

    ae77c94a61d57734721deb063a7b6810

  • SHA1

    60aaaae059ecd0a2c023aa0b04d45ae0fd810d0f

  • SHA256

    9d91cbc0bff07a1c1749886482c8defb287c1a2528e60d6f7100e6030470c482

  • SHA512

    38ac4b217faa9bf5d61d3ddfef35286c56f5e6305d660f40d74c0df60f84a551720b9f56ebb99317583a0ce8c716be755b24054575591cdd95f4a1af3b5cfb2f

  • SSDEEP

    24576:/LFn3VKYc4m2vYoYMUa0uBMErtkudRdUshmGD6QOqCqFUFkLY/KJlXl3RuQ5531v:/LFn3VK/4m4OWCqFUFkkC3Xl3h

Malware Config

Extracted

Family

raccoon

Botnet

ce21570f8b07f4e68bfb7f44917635b1

C2

http://77.73.133.7/

rc4.plain

Targets

    • Target

      9d91cbc0bff07a1c1749886482c8defb287c1a2528e60d6f7100e6030470c482.exe

    • Size

      2.5MB

    • MD5

      ae77c94a61d57734721deb063a7b6810

    • SHA1

      60aaaae059ecd0a2c023aa0b04d45ae0fd810d0f

    • SHA256

      9d91cbc0bff07a1c1749886482c8defb287c1a2528e60d6f7100e6030470c482

    • SHA512

      38ac4b217faa9bf5d61d3ddfef35286c56f5e6305d660f40d74c0df60f84a551720b9f56ebb99317583a0ce8c716be755b24054575591cdd95f4a1af3b5cfb2f

    • SSDEEP

      24576:/LFn3VKYc4m2vYoYMUa0uBMErtkudRdUshmGD6QOqCqFUFkLY/KJlXl3RuQ5531v:/LFn3VK/4m4OWCqFUFkkC3Xl3h

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks