General

  • Target

    ddc8ffd0641b7d561430ae489fc6aeb0.exe

  • Size

    282KB

  • Sample

    230622-lbbqaaeh4v

  • MD5

    ddc8ffd0641b7d561430ae489fc6aeb0

  • SHA1

    a14c77468476aa2c5e8dfe75f35e8751f1ddce87

  • SHA256

    fd499f6e9aeec4927a0b4ef013123db28d6ec283845cf8b6632efd209f53d383

  • SHA512

    c7d745a47567ec4ac46bdd030d3331ec6b73f551def021b9b72b870780558a70fe6c3d097f0a7d679eb2d74714975f783ecd39a6c71129dae464e9b5c7ee0ab7

  • SSDEEP

    6144:tFnyEWXGf0TsCK1HRqTlPdLd5nAGkCi2K:7yEUGfws/1xeNd5I

Malware Config

Extracted

Family

raccoon

Botnet

d994c0b62868be51c69e73ee757b68ca

C2

http://95.217.163.56:8089/

xor.plain

Targets

    • Target

      ddc8ffd0641b7d561430ae489fc6aeb0.exe

    • Size

      282KB

    • MD5

      ddc8ffd0641b7d561430ae489fc6aeb0

    • SHA1

      a14c77468476aa2c5e8dfe75f35e8751f1ddce87

    • SHA256

      fd499f6e9aeec4927a0b4ef013123db28d6ec283845cf8b6632efd209f53d383

    • SHA512

      c7d745a47567ec4ac46bdd030d3331ec6b73f551def021b9b72b870780558a70fe6c3d097f0a7d679eb2d74714975f783ecd39a6c71129dae464e9b5c7ee0ab7

    • SSDEEP

      6144:tFnyEWXGf0TsCK1HRqTlPdLd5nAGkCi2K:7yEUGfws/1xeNd5I

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks