General

  • Target

    fac8ff498944eda2e7c63230d2d5159d.exe

  • Size

    261KB

  • Sample

    230703-txd2jaae3t

  • MD5

    fac8ff498944eda2e7c63230d2d5159d

  • SHA1

    fbe7bf1edd8e024f13b02acfa174324725c5d193

  • SHA256

    6de48ec2e58c733b944fda7740ecb99d717a42ba3d586682915a2b3f6a980a43

  • SHA512

    ec1a3e18a8e3a5d6e336aca08d9b302e1ee77763bc9aa7e618177fd6534d531948593f84b8551cc62b5ba47dd9f0cc33a013a19843168e09dc9146f117b5851f

  • SSDEEP

    3072:/7ksIDXvVgSz53HxeY3MhFG8yyrHe6PKMFrXh5ibGflYkLePKE6jM:AcSz53HH3cBTJy+bhaM9qKd

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

xor.plain

Targets

    • Target

      fac8ff498944eda2e7c63230d2d5159d.exe

    • Size

      261KB

    • MD5

      fac8ff498944eda2e7c63230d2d5159d

    • SHA1

      fbe7bf1edd8e024f13b02acfa174324725c5d193

    • SHA256

      6de48ec2e58c733b944fda7740ecb99d717a42ba3d586682915a2b3f6a980a43

    • SHA512

      ec1a3e18a8e3a5d6e336aca08d9b302e1ee77763bc9aa7e618177fd6534d531948593f84b8551cc62b5ba47dd9f0cc33a013a19843168e09dc9146f117b5851f

    • SSDEEP

      3072:/7ksIDXvVgSz53HxeY3MhFG8yyrHe6PKMFrXh5ibGflYkLePKE6jM:AcSz53HH3cBTJy+bhaM9qKd

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks