General

  • Target

    ProtonVPN_3.0.5.exe

  • Size

    296KB

  • Sample

    230513-qwsazsae81

  • MD5

    c5e15dbab0811bd42a6e4d62132ff459

  • SHA1

    777ad485da8359a3194b8b5f6fad514bffd5cdac

  • SHA256

    1599a612187565c699dfe4f10b04f5621ba04ab053ba1284a008706f0c13d5cb

  • SHA512

    c9d5b3e30bac46efe397dcf108cf31d9d641ae5adebde777fccf5314384d2d565a09d25e8c2f5586bcde83b746f63478be95c2a22ec28efec6fd497355b4f35b

  • SSDEEP

    6144:yo4ozSmgUkbkN6eyzrcnEAaz9mdb9/pTqHu8uiHL:ZBSmgUkIa0ELz9mt9/EO8LL

Malware Config

Extracted

Family

raccoon

Botnet

5b7eff386f31487f5db4c7f0e4006546

C2

http://165.232.118.86/

xor.plain

Targets

    • Target

      ProtonVPN_3.0.5.exe

    • Size

      296KB

    • MD5

      c5e15dbab0811bd42a6e4d62132ff459

    • SHA1

      777ad485da8359a3194b8b5f6fad514bffd5cdac

    • SHA256

      1599a612187565c699dfe4f10b04f5621ba04ab053ba1284a008706f0c13d5cb

    • SHA512

      c9d5b3e30bac46efe397dcf108cf31d9d641ae5adebde777fccf5314384d2d565a09d25e8c2f5586bcde83b746f63478be95c2a22ec28efec6fd497355b4f35b

    • SSDEEP

      6144:yo4ozSmgUkbkN6eyzrcnEAaz9mdb9/pTqHu8uiHL:ZBSmgUkIa0ELz9mt9/EO8LL

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks