General

  • Target

    The-Activated-Setup1.exe

  • Size

    25.6MB

  • Sample

    230718-kdl4cshb74

  • MD5

    7f7d50ed8f4a8432a0371c83693e3bdc

  • SHA1

    e2b50df6d0b61f67e0bb7caa6fb444699ee096dc

  • SHA256

    cfb378f8d902d20bc733c205ee8d7f1e4493da6971400fa0c8515f37001212b9

  • SHA512

    322850f8137bf59b0fc5a39c36442bff92cb21cb7ec42be06a05d13bb148ea90a2b3fccc31bf042065ce2bfa7ad16b3c8d422274dc1a3d24eed995e62759a6b5

  • SSDEEP

    393216:hGMbkfWjBPBtR0LUKfS9vXRBKaNF+AWkafU5wl7zAhAHuKv+PSFq9A9/ceW:h+ePXWLBadWaBWHsERHupPar9/c7

Malware Config

Extracted

Family

raccoon

Botnet

67f7314de84b54b5f21ebf56b4ba37ca

C2

http://79.137.248.173:80/

http://89.208.106.110:80/

xor.plain

Targets

    • Target

      The-Activated-Setup1.exe

    • Size

      25.6MB

    • MD5

      7f7d50ed8f4a8432a0371c83693e3bdc

    • SHA1

      e2b50df6d0b61f67e0bb7caa6fb444699ee096dc

    • SHA256

      cfb378f8d902d20bc733c205ee8d7f1e4493da6971400fa0c8515f37001212b9

    • SHA512

      322850f8137bf59b0fc5a39c36442bff92cb21cb7ec42be06a05d13bb148ea90a2b3fccc31bf042065ce2bfa7ad16b3c8d422274dc1a3d24eed995e62759a6b5

    • SSDEEP

      393216:hGMbkfWjBPBtR0LUKfS9vXRBKaNF+AWkafU5wl7zAhAHuKv+PSFq9A9/ceW:h+ePXWLBadWaBWHsERHupPar9/c7

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks