General

  • Target

    Rljanzfv-1.exe

  • Size

    1.3MB

  • Sample

    230630-ppbtzsbd46

  • MD5

    59d922ea8927648089227a1ffc5e700d

  • SHA1

    901d55086adb3e9e16ad72f5c96d5e26d6efb7c6

  • SHA256

    b98c25c9332c08071cdce0e2076000fc1c918b058af7bfd572724b1e86f8ecb5

  • SHA512

    0c0f5b1ce4a0a5a6481ecf4f8bb879e3cb595242b65929e0e701d771c61a1fda9391d05c18414df7bcb00383deb25949d047cbde761ad0d3bbc27d0f261c0541

  • SSDEEP

    24576:K3s4iZ53q2dqMBu37qRjWWprCycXa0dU:K

Malware Config

Extracted

Family

raccoon

Botnet

071a7b18a42c1cd94de2fc5bb0bbcaf2

C2

http://85.209.134.122:80/

xor.plain

Targets

    • Target

      Rljanzfv-1.exe

    • Size

      1.3MB

    • MD5

      59d922ea8927648089227a1ffc5e700d

    • SHA1

      901d55086adb3e9e16ad72f5c96d5e26d6efb7c6

    • SHA256

      b98c25c9332c08071cdce0e2076000fc1c918b058af7bfd572724b1e86f8ecb5

    • SHA512

      0c0f5b1ce4a0a5a6481ecf4f8bb879e3cb595242b65929e0e701d771c61a1fda9391d05c18414df7bcb00383deb25949d047cbde761ad0d3bbc27d0f261c0541

    • SSDEEP

      24576:K3s4iZ53q2dqMBu37qRjWWprCycXa0dU:K

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks