General

  • Target

    732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e

  • Size

    257KB

  • Sample

    230731-hzmwnsdb85

  • MD5

    889b4d4156539e6ded3ee6b5d323d0fd

  • SHA1

    6984e63f73bcaa03775736929b7249f147bb7e95

  • SHA256

    732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e

  • SHA512

    d5dd7088c2a2b4ef4e4a72682cb01cea645cef09d41759031cbbfc028c1c7d437ee93c8cd149be2b076ebb198b5584e4b83b2e42a2bfc3bc57f7f8f7e307c98a

  • SSDEEP

    3072:JRFbvxW2cSLCqngKJUW3cMHdvxFjMW+nKDR9D:nFD82xLzndLMMHNY

Malware Config

Extracted

Family

raccoon

Botnet

c610d498a9c34173052f3f4fcea051af

C2

http://galandskiyher1.com:80/

xor.plain

Targets

    • Target

      732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e

    • Size

      257KB

    • MD5

      889b4d4156539e6ded3ee6b5d323d0fd

    • SHA1

      6984e63f73bcaa03775736929b7249f147bb7e95

    • SHA256

      732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e

    • SHA512

      d5dd7088c2a2b4ef4e4a72682cb01cea645cef09d41759031cbbfc028c1c7d437ee93c8cd149be2b076ebb198b5584e4b83b2e42a2bfc3bc57f7f8f7e307c98a

    • SSDEEP

      3072:JRFbvxW2cSLCqngKJUW3cMHdvxFjMW+nKDR9D:nFD82xLzndLMMHNY

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks