General

  • Target

    35e7110e47ba3d42bf5b71937e02ce8b.bin

  • Size

    209KB

  • Sample

    230601-bkwrpscc6z

  • MD5

    ed79ad2aa13496de3032111d7c5210dc

  • SHA1

    dcf1da76ddf0fc336917989277bcfacbce5c1360

  • SHA256

    c2f0d5eb5bc9b0fdf6be1d8068c7713eb4319b4fbb9461d24ae9d10d0382004e

  • SHA512

    3e47a24974b5ddc725b335174b90d56294389335373816b18d2cb5639c47e6d477ffec7689660b9d00275260bb9fc4c60f7785c2cb279740cab6b75bd6b083c9

  • SSDEEP

    6144:C3/dL1rfvhyt/caw5dXhb+s1XROBmG0+ApgaK:Wh1T8cn59d+s1XM70piz

Score
10/10

Malware Config

Extracted

Family

raccoon

rc4.plain

Targets

    • Target

      792f7b6362d213e5976d71aea0f36488aae184b30e021210e847d1450546c39d.exe

    • Size

      489KB

    • MD5

      35e7110e47ba3d42bf5b71937e02ce8b

    • SHA1

      7194f08ad122d5e2e1d7b432522d6e9fc2565d7b

    • SHA256

      792f7b6362d213e5976d71aea0f36488aae184b30e021210e847d1450546c39d

    • SHA512

      70020e4680f74fd17705b14b0cc11541c773844952ee211eda82291b49b07c94acae9a7aa406c0f6e41fbad4a54d7ff10432b0acb0b2bbf5bc66201b8c6aec43

    • SSDEEP

      12288:qimcuTGiqcyQoiAsxhfi+/wHKK8zsK/nn6F2oG:qimcUGiqcyuAoh6jHKRzsKvQ23

    Score
    10/10
    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks