General

  • Target

    67e48ee9ec9894c670772bd29e179d608f5fcd7d0458590362f87c6bdad22db8

  • Size

    194KB

  • Sample

    230122-2expxsbh7v

  • MD5

    0c45befd8113b0b02ef910f3b9f314e4

  • SHA1

    7b1fcb15e6d54b7a4488322853ab6fac106d1b36

  • SHA256

    67e48ee9ec9894c670772bd29e179d608f5fcd7d0458590362f87c6bdad22db8

  • SHA512

    d70251c820ed637bd49ae65f55191a28fe356addab9eaf5af2b3b8e144c6c96de35f2749aed81af7386c9c286a3a35b7316a229e9ce9a252bcc02e9f8d11d1f6

  • SSDEEP

    3072:kBN0X6eVz9yL2wGdH5Uv7iL/S16s761j8dxyrlrbslnakU5skepvP:8i+L2FdizT16se1j8dxIlrwlPtkwP

Malware Config

Extracted

Family

raccoon

Botnet

94c54520400750937a6f1bf6044f8667

C2

http://185.181.10.208/

rc4.plain

Targets

    • Target

      67e48ee9ec9894c670772bd29e179d608f5fcd7d0458590362f87c6bdad22db8

    • Size

      194KB

    • MD5

      0c45befd8113b0b02ef910f3b9f314e4

    • SHA1

      7b1fcb15e6d54b7a4488322853ab6fac106d1b36

    • SHA256

      67e48ee9ec9894c670772bd29e179d608f5fcd7d0458590362f87c6bdad22db8

    • SHA512

      d70251c820ed637bd49ae65f55191a28fe356addab9eaf5af2b3b8e144c6c96de35f2749aed81af7386c9c286a3a35b7316a229e9ce9a252bcc02e9f8d11d1f6

    • SSDEEP

      3072:kBN0X6eVz9yL2wGdH5Uv7iL/S16s761j8dxyrlrbslnakU5skepvP:8i+L2FdizT16se1j8dxIlrwlPtkwP

    • Detects Smokeloader packer

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks