Resubmissions

20-02-2023 05:44

230220-gflzlahc6w 10

General

  • Target

    MDE_File_Sample_0a.zip

  • Size

    1.4MB

  • Sample

    230220-gflzlahc6w

  • MD5

    969c76c606bd18792bc2acb3944d76c1

  • SHA1

    9df39202fdb533508c51b9efcc3eb169a10d8c1b

  • SHA256

    b297a76de5182907a69a878cf161ca65b274152eb92a9d9591248ac4f5494dcf

  • SHA512

    6100009f7fc88bc22e7be41bbdc3fc8b1a4ba24fbe59abbe84646c5f2eafb84aab6cfbbfa3e4d199e308660f4dd35be3fc01afaeb70a61c4d823b044d37a3ac3

  • SSDEEP

    24576:+hBNa4T6AUdB9fPGMmEOtIX8OxJNzmtXdBJTJyyZwn8cMV0VGkK122VNei2j5cne:+vBUf9TmEOtwFNSnBryyOnCyVGkK1f2b

Malware Config

Extracted

Family

raccoon

Botnet

ae72a9288d2ce774d14ddadddb8258c1

C2

http://83.217.11.11/

rc4.plain

Targets

    • Target

      Setup.exe

    • Size

      438.2MB

    • MD5

      5b1914a62235a396b7caed0b6625dd97

    • SHA1

      c53b265f1101cc775cc591d312de6072fa53ce6e

    • SHA256

      e5b78dd4d31d810e37a8b53d20c3351afe8e6186d90abd026d1d051a6e39ddeb

    • SHA512

      fd6f81bac09781d52221fb86d7f2def9b8fb1df80dee6757c9865a86c9ce48edda0ab1d5e452fc4fa3ccb1658bc1d5cb7d30a76b7360c4bb77b311f1f1d5b208

    • SSDEEP

      24576:IGp1/PD9pD6b3ewHdqoTL2lWA7QUgVs1bFBpWvyf7:IGpVPDSb/XL2lWmQRzI7

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Suspicious use of SetThreadContext

    • Target

      langs/English.ini

    • Size

      107KB

    • MD5

      525ce1c02ca53f9c63cb697ed3aae899

    • SHA1

      9ddc2763d9dd663f3cb0febf0d580e21c52c2f18

    • SHA256

      0f9d467f6bb6f682c0d1351b26038950c73720f2bfc0741ec1c7bfab2046d75f

    • SHA512

      734d599d839b1266c42f340e044243ae30d1859d314eed7738f72f59201d19359f1ac6ee0cac8bfef4a0a2b8f2232a4f1f33336770c8c43f929c1bef162d2317

    • SSDEEP

      1536:5S5Ybl8/lKlXiF3y24FMuRvV5I7BohUT1:xxXiVQV5uJ1

    Score
    1/10

MITRE ATT&CK Matrix

Tasks