Resubmissions

16-07-2023 16:09

230716-tlsqjsfe78 10

16-07-2023 16:02

230716-tgs6hsgd2v 10

General

  • Target

    daniilcoder_crypted.exe

  • Size

    538KB

  • Sample

    230716-tlsqjsfe78

  • MD5

    82fb3cc145b2b05aa6750513d393a2b2

  • SHA1

    97b18db9775fc94ffc6d66f17eb5e3a889203d63

  • SHA256

    6d9c24fc94431a1ed496008696fca844cfa262b21a2622651cecf4683a436900

  • SHA512

    a46394d9f541fd56e36d43cacbaf10b2eac97b0bcc33a31c6c0d02772547621da7167a5d86fe047337de0d5ca112c0bcb2d6798ecc77c4673c8c835d96c65884

  • SSDEEP

    12288:V77crGJ/xyKB9UyTLrY1XROcbzu2qgR0h76Z:R+GJ/zrYHb/R0h7

Malware Config

Extracted

Family

raccoon

Botnet

f11400b7e6aba41ec29466fc8776c524

C2

http://94.142.138.147:77u

xor.plain

Targets

    • Target

      daniilcoder_crypted.exe

    • Size

      538KB

    • MD5

      82fb3cc145b2b05aa6750513d393a2b2

    • SHA1

      97b18db9775fc94ffc6d66f17eb5e3a889203d63

    • SHA256

      6d9c24fc94431a1ed496008696fca844cfa262b21a2622651cecf4683a436900

    • SHA512

      a46394d9f541fd56e36d43cacbaf10b2eac97b0bcc33a31c6c0d02772547621da7167a5d86fe047337de0d5ca112c0bcb2d6798ecc77c4673c8c835d96c65884

    • SSDEEP

      12288:V77crGJ/xyKB9UyTLrY1XROcbzu2qgR0h76Z:R+GJ/zrYHb/R0h7

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks