General

  • Target

    set-up.zip

  • Size

    2.2MB

  • Sample

    230629-b9lysscf2t

  • MD5

    149b8dad07609822afbcd4943377a39e

  • SHA1

    3d0eff0b31c79cd824532eba521ec161b610e43b

  • SHA256

    84f7a27811b009113434281dea04b0d47da19617b3ef5961cb27882d96070c5a

  • SHA512

    00481c1e63adca8a6047720adb72034912e5c010db9c4222fb3de5281cd76bcdbb8ba72a3558e98e58772248e78dfbbf4c573ab89966a105cf3a1647ed82312f

  • SSDEEP

    49152:jO5e9ALPMxH5u+JL/bcqknhy055Kltcg9xPy6V42V/UgXfCMk:jGe+LP+ZXxbcqizTKoEP4e//6

Malware Config

Extracted

Family

raccoon

Botnet

bfbcd0ada8d3bffa2d0bd90c2e930c27

C2

http://185.157.120.15:80/

xor.plain

Targets

    • Target

      set-up.exe

    • Size

      371KB

    • MD5

      192e4c5d8014a5ea0fc2e9037c9495fb

    • SHA1

      567611db1e7e4f55c441e06665335938ba8b32d4

    • SHA256

      f050a85f54e4d19d5c9ee302406922889e518df2607d67606f8f952f97853de6

    • SHA512

      0a9fdece10945ce2f21474c46ae4f49d372f30653022b524229e8837aca8955f4fc854c662d5b45aff98c61f356f8dcb4723e81079813ccf9cfa858d17d92c80

    • SSDEEP

      6144:94A7hhxG1koJKi6rBRNAO4EiAsnbzrpVnoHBiuqavmYrfefn/5:uChhxwUNiWsnbPp1KBbr3rWfnB

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks