General

  • Target

    2905191d3a315e5164623c88a2945627.exe

  • Size

    256KB

  • Sample

    230711-s3cvzshf66

  • MD5

    2905191d3a315e5164623c88a2945627

  • SHA1

    48ba5ff1e9e5240fe3591fbbc8c924e28e4588b6

  • SHA256

    0dfdd050edba7117390e72fc4279a2dafee5ecdfa49f0ccfe693393cbaad7c35

  • SHA512

    781f63c0dfa27cdc33f3b34fcb6c1961c561ff2579c81c9a42c43f91b8b7d65c81008cf38511dd1483e571b17d534a6434b20eb3e3a543339f95d3f6554e5984

  • SSDEEP

    3072:+HbbiVO6sFAui19qTQM0vclPgyI/MQFep6DOvJFBVi1CqTB:8oOauh2vclPqEQFMTvJh

Malware Config

Extracted

Family

raccoon

Botnet

6bb5fbdb7121bc7ea628330bef79c129

C2

http://5.78.78.150:8088/

xor.plain

Targets

    • Target

      2905191d3a315e5164623c88a2945627.exe

    • Size

      256KB

    • MD5

      2905191d3a315e5164623c88a2945627

    • SHA1

      48ba5ff1e9e5240fe3591fbbc8c924e28e4588b6

    • SHA256

      0dfdd050edba7117390e72fc4279a2dafee5ecdfa49f0ccfe693393cbaad7c35

    • SHA512

      781f63c0dfa27cdc33f3b34fcb6c1961c561ff2579c81c9a42c43f91b8b7d65c81008cf38511dd1483e571b17d534a6434b20eb3e3a543339f95d3f6554e5984

    • SSDEEP

      3072:+HbbiVO6sFAui19qTQM0vclPgyI/MQFep6DOvJFBVi1CqTB:8oOauh2vclPqEQFMTvJh

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks