General

  • Target

    79c1be7c958d5cded0534d37b0104305.exe

  • Size

    197KB

  • Sample

    230412-fdd1jahh63

  • MD5

    79c1be7c958d5cded0534d37b0104305

  • SHA1

    75a9e56db55915fab4593586374e0ef95410db34

  • SHA256

    59873832d59ac86759e5df7dd96e49049b3b221da1ab1b71ede21b271c3168a7

  • SHA512

    4549beb040c6d8f4f4f35e02c62c19374b1ed95577e6bce167bbb3c82ca5c87e2d8fdb72644a9e8c15233e0ecf656f6fae41bb3fd48ba674756e4ed0793670c6

  • SSDEEP

    6144:r28W38HAsKSVUu+f4wd7UUA/A1QcL0mUpUgb:3XHAsKfJ77A/An4x

Malware Config

Extracted

Family

raccoon

Botnet

c610d498a9c34173052f3f4fcea051af

C2

http://respekt5568.com/

xor.plain

Targets

    • Target

      79c1be7c958d5cded0534d37b0104305.exe

    • Size

      197KB

    • MD5

      79c1be7c958d5cded0534d37b0104305

    • SHA1

      75a9e56db55915fab4593586374e0ef95410db34

    • SHA256

      59873832d59ac86759e5df7dd96e49049b3b221da1ab1b71ede21b271c3168a7

    • SHA512

      4549beb040c6d8f4f4f35e02c62c19374b1ed95577e6bce167bbb3c82ca5c87e2d8fdb72644a9e8c15233e0ecf656f6fae41bb3fd48ba674756e4ed0793670c6

    • SSDEEP

      6144:r28W38HAsKSVUu+f4wd7UUA/A1QcL0mUpUgb:3XHAsKfJ77A/An4x

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks