General

  • Target

    c4c5f46ae144945f7f557f2dafda9321ddff6501dfd2b938512c496b73e3940b.zip

  • Size

    6.7MB

  • Sample

    221121-m2y4yaff49

  • MD5

    f304bf6425b9f1d843aacc10cf012cc8

  • SHA1

    4b90abba9c25066e1a3cda663fcbae04ba82d39c

  • SHA256

    f7e0d99273fc85d711579dc9e58a6a3a78ad171635ffbc761aa9fd49097c54f0

  • SHA512

    c1b8406a72f50fd57b02f58b57e89876b35ced55b6ee90ff89bf1020c2683b972acc8ca895c7b953756ab755e128b31c62864e92df8918caa6ae1e6dc221a7a1

  • SSDEEP

    196608:tKTxd/HkFrJlwPVKN6ewJL7pMzkf7C8/ihMs0xbNpWMgdCOlyqcE:tKTfHk7loVJtL7pykf7CWyHypjZarZ

Malware Config

Extracted

Family

raccoon

Botnet

ed21f92a8447e78ab0592dc4722f2ddd

C2

http://46.249.58.152/

rc4.plain

Targets

    • Target

      c4c5f46ae144945f7f557f2dafda9321ddff6501dfd2b938512c496b73e3940b.exe

    • Size

      7.2MB

    • MD5

      a3a28f604516c08d47b1fff38899b58b

    • SHA1

      40ecd4d51a4fe5162b59408ad5c51a88c4a83495

    • SHA256

      c4c5f46ae144945f7f557f2dafda9321ddff6501dfd2b938512c496b73e3940b

    • SHA512

      c4491a201580371a859cfeebdec1fe43fa6fe9c95cdf127e686c974d8866717f3a0828a7734c76df0120a4635e1606538c88dd16ccbcb26ff4208f575754c652

    • SSDEEP

      196608:DDboi8HWXAoZkdJh1nf51OHeR8f3RuOxrAKBZ7VrZ:DfoiKWwoCjH1OHQq3Ruq0WZB

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks