General

  • Target

    !T@-#Setup-Pa$SW0rd-4545.rar

  • Size

    21.7MB

  • Sample

    230725-gxl1xsaf22

  • MD5

    decb6b072792c51317a6cf0eb3901a20

  • SHA1

    5ed7e8dc2ee1ab2e5908505d295820e99cb2cc42

  • SHA256

    a131311155f5e2dfb80163fa8ce7111606a64fad47b7ed19d0bfb765000b4bbe

  • SHA512

    77b47687da77810a54644fb81a9e78f04ae82c77999c8606e7c5dfc536e4f72edfa1468e67ebe2176c62dd07e3c4494e5d9cf6f8a93193495b90f0ae6e869c6c

  • SSDEEP

    393216:M8zMDQ97wtr+6QsO42WDu4Z0rNyo4W52+zKGJGD3jYrf1aTHkII:dzcwstr+F42WDu4ZmqzMrf1aq

Malware Config

Extracted

Family

raccoon

Botnet

d843e8fa1ee1dfc195b20362a6b5cd71

C2

http://91.103.252.156:80/

xor.plain

Targets

    • Target

      !Z@#Setups-Pa$$W0rd-4545/Pre_Updated_Setup.exe

    • Size

      771.6MB

    • MD5

      ce498d59fae27f5c42cda32c26d43520

    • SHA1

      0eef9a1941d93e04cd6797ed6c79c6ca202f40dc

    • SHA256

      12dd22f3a312b2558caa2ccea1796a4b7ca7d5635c703175e0289e6590b48220

    • SHA512

      8c64f222d5322f3324b6658c9bee77c6233cce4c9120a4c1e30181e9c33fe0f6aec67d67d1c27dff6657a2bb6195d0a80bf6ca4cdc5cf054dca1be3ac65f6daa

    • SSDEEP

      25165824:znnnnnnnnnnnnnnnnnnnnn3nnnnnnnnnnnnnnnnnnnnn3nnnF:znnnnnnnnnnnnnnnnnnnnn3nnnnnnnn1

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks