General

  • Target

    59546ac94e9ff262d93ea60934079d4d.exe

  • Size

    199KB

  • Sample

    230704-qhs1csdc93

  • MD5

    59546ac94e9ff262d93ea60934079d4d

  • SHA1

    f4d1cb47c749b3a00c84a88d309805d71ce9ce16

  • SHA256

    f47935627a5be41526be384d115b1f291d854063d0b31bee2c9c11dc65695438

  • SHA512

    5751dcd96849c620fb0966f8077ff38844ea6a7807900b1688c5089f486bacdec8e09455022bb05e25aa5f71306ee786403f5fbf10cbd8dc0a8a195105f7d074

  • SSDEEP

    3072:/e6s1L1wtR5x5Y4Ykrcd/ewCokL7h3lbrRvzB865tgc:FIL1wK4YEcdpCokfvhvzDg

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

xor.plain

Targets

    • Target

      59546ac94e9ff262d93ea60934079d4d.exe

    • Size

      199KB

    • MD5

      59546ac94e9ff262d93ea60934079d4d

    • SHA1

      f4d1cb47c749b3a00c84a88d309805d71ce9ce16

    • SHA256

      f47935627a5be41526be384d115b1f291d854063d0b31bee2c9c11dc65695438

    • SHA512

      5751dcd96849c620fb0966f8077ff38844ea6a7807900b1688c5089f486bacdec8e09455022bb05e25aa5f71306ee786403f5fbf10cbd8dc0a8a195105f7d074

    • SSDEEP

      3072:/e6s1L1wtR5x5Y4Ykrcd/ewCokL7h3lbrRvzB865tgc:FIL1wK4YEcdpCokfvhvzDg

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks