General

  • Target

    77fe3e6231388c1b5c97c89044117aa5.exe

  • Size

    1.1MB

  • Sample

    230731-ghc5gadg2z

  • MD5

    77fe3e6231388c1b5c97c89044117aa5

  • SHA1

    42fe4de17b9121fd7364eaccbd0f1e356424f520

  • SHA256

    ceb0b34bf3d2f9ef826aefe57e9f1c599925a5c57cb35425a5af808c5f1a979b

  • SHA512

    9266e30f5a70ff824f1d266172dbc1cc3074d6b58722010c1451203b223cdaf9f33e811187fe7a57aa147714869044e9358faac63c904dbf4d1dd37dc17f400d

  • SSDEEP

    24576:Lki4YGb0KwdK2JZMHyfv5Y5uqwgRDOiz4nBY:Lki4V0VDUIy5X9RDOk4ni

Malware Config

Extracted

Family

raccoon

Botnet

3fcb8af1f84748c4ea416ee206ea216c

C2

http://84.246.85.83:80/

xor.plain

Targets

    • Target

      77fe3e6231388c1b5c97c89044117aa5.exe

    • Size

      1.1MB

    • MD5

      77fe3e6231388c1b5c97c89044117aa5

    • SHA1

      42fe4de17b9121fd7364eaccbd0f1e356424f520

    • SHA256

      ceb0b34bf3d2f9ef826aefe57e9f1c599925a5c57cb35425a5af808c5f1a979b

    • SHA512

      9266e30f5a70ff824f1d266172dbc1cc3074d6b58722010c1451203b223cdaf9f33e811187fe7a57aa147714869044e9358faac63c904dbf4d1dd37dc17f400d

    • SSDEEP

      24576:Lki4YGb0KwdK2JZMHyfv5Y5uqwgRDOiz4nBY:Lki4V0VDUIy5X9RDOk4ni

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks