General

  • Target

    2c456231b6d0745678d27477f46a78ec.bin

  • Size

    156KB

  • Sample

    230712-bhwzpace6w

  • MD5

    431e968efd0e91696bab59ec045b6849

  • SHA1

    60e7274db37fd0b75108739bd94a1d4aacf2200f

  • SHA256

    e032ada5ccdce4f5cf4c4bf5d309d2a05094275a4cfea655a678c4bc318ff7c6

  • SHA512

    1c0990ce12a9045736da2dab210ae8c7b70e23501ef2c67710e01fc415e6784936a0508c69c011c6f08efe3369d921995d70a879fa17587aff5b1d8c71055631

  • SSDEEP

    3072:yXGwog4Z/8WSOH3MumYojgnGA+vXgM19/gPm6PN9Eo9cqF5:yXGwT4Z/LjHcu9ojgZEeEEjF5

Malware Config

Extracted

Family

raccoon

Botnet

6bb5fbdb7121bc7ea628330bef79c129

C2

http://5.78.78.150:8088/

xor.plain

Targets

    • Target

      2513cf6aa56a6fb9c84061ac04c8df3e225258638f9f0d40ce898a9096f93e9b.exe

    • Size

      241KB

    • MD5

      2c456231b6d0745678d27477f46a78ec

    • SHA1

      13c2ffb4bf48f98ff6ca5f2ea082480a082d6321

    • SHA256

      2513cf6aa56a6fb9c84061ac04c8df3e225258638f9f0d40ce898a9096f93e9b

    • SHA512

      a82f6021467bf6f9f7d8026b5fdfe96660330e6d36175cfcad649e70688875ff26588528464ae80063f6311c5c7392cd3fdaa69562068414412c912279455296

    • SSDEEP

      3072:/7TLJivCcb1nX/DBQ67rlMQ5kgN0LucGuW0d3WJ4K/:TTLJtgX/d77q5gN0CjRbJ4K

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks