General

  • Target

    ravenlogs_support2_crypted.exe

  • Size

    2.9MB

  • Sample

    230717-yypa4sef98

  • MD5

    5d73d251554b416eb4c927628fbfe329

  • SHA1

    559347beeead090d4c92fa254b0945203a77102b

  • SHA256

    5081e0d8844cc27a71517378113f26c63874b5ab0ad6594e176aa18e8cd5c05b

  • SHA512

    3c2f983b83bb33b5890f101efae9369a004a6486125af995915d02f4a2e8627cc6b90720579c3ab46175085abc2e3d2d1f87c452622507a907806a895c411912

  • SSDEEP

    3072:TEUMhXqFvO4VJLFEF01l2NiNefRHspHlqMOHZHx3PL6dG5lBtaN1TerA:xGmWmLFEFK2iNQHCu3L6CBQ1e8

Malware Config

Extracted

Family

raccoon

Botnet

090ee2c828684f1a18eff796733b49ed

C2

http://94.142.138.147:77z

xor.plain

Targets

    • Target

      ravenlogs_support2_crypted.exe

    • Size

      2.9MB

    • MD5

      5d73d251554b416eb4c927628fbfe329

    • SHA1

      559347beeead090d4c92fa254b0945203a77102b

    • SHA256

      5081e0d8844cc27a71517378113f26c63874b5ab0ad6594e176aa18e8cd5c05b

    • SHA512

      3c2f983b83bb33b5890f101efae9369a004a6486125af995915d02f4a2e8627cc6b90720579c3ab46175085abc2e3d2d1f87c452622507a907806a895c411912

    • SSDEEP

      3072:TEUMhXqFvO4VJLFEF01l2NiNefRHspHlqMOHZHx3PL6dG5lBtaN1TerA:xGmWmLFEFK2iNQHCu3L6CBQ1e8

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks