General

  • Target

    7DAF07F31B4C9A8F7BEBDF7CF06C1DE2BFFCD2DF70F67.exe

  • Size

    408KB

  • Sample

    230205-snfy4aaa25

  • MD5

    30e3a74a9d29671b7638499ef5d59053

  • SHA1

    2361cc3085465e3d8e632395b8d5a07ea029c028

  • SHA256

    7daf07f31b4c9a8f7bebdf7cf06c1de2bffcd2df70f675bcc995906054a77177

  • SHA512

    14f0040df92886d90c277076b9e90c015c2daccfa20f25da84146359eebd8c299d3102593fca0f27053fdf1550afc03ce59381b963e0c887def0ea029abdf09e

  • SSDEEP

    6144:xLmBZYc9gTIu3mJ4f5PY+fUXxBN0KOUg0QV3fj1wUcw8tx2/kpZOwBuHBTpOdN87:xLGZCTV/qkjJwUcw8D2/k3OH

Malware Config

Extracted

Family

raccoon

Botnet

2dbfb7ebbdc8183124d0ac1729de140a

C2

http://45.15.156.62

rc4.plain

Targets

    • Target

      7DAF07F31B4C9A8F7BEBDF7CF06C1DE2BFFCD2DF70F67.exe

    • Size

      408KB

    • MD5

      30e3a74a9d29671b7638499ef5d59053

    • SHA1

      2361cc3085465e3d8e632395b8d5a07ea029c028

    • SHA256

      7daf07f31b4c9a8f7bebdf7cf06c1de2bffcd2df70f675bcc995906054a77177

    • SHA512

      14f0040df92886d90c277076b9e90c015c2daccfa20f25da84146359eebd8c299d3102593fca0f27053fdf1550afc03ce59381b963e0c887def0ea029abdf09e

    • SSDEEP

      6144:xLmBZYc9gTIu3mJ4f5PY+fUXxBN0KOUg0QV3fj1wUcw8tx2/kpZOwBuHBTpOdN87:xLGZCTV/qkjJwUcw8D2/k3OH

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks