General

  • Target

    756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f

  • Size

    258KB

  • Sample

    230731-l8yw3sfd2x

  • MD5

    db1a74cb163b304f673c194adcc133e4

  • SHA1

    e08546ef2544b10cce83444156e75f2d8628370c

  • SHA256

    756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f

  • SHA512

    dcc476f616d0854dd585edadafe8773f6950a436bcfb9db14bd4432bd67f886ab7b83ba1e8c9ef921df09b4774a750b797dc26fa9e6c911f623fd40853f68716

  • SSDEEP

    3072:7RF+34S2+aSBZv6/E5u/15/BpstRZc97LL2v3KICN:tFKt2nS/vOLN5/P93L2v3

Malware Config

Extracted

Family

raccoon

Botnet

c610d498a9c34173052f3f4fcea051af

C2

http://galandskiyher1.com:80/

xor.plain

Targets

    • Target

      756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f

    • Size

      258KB

    • MD5

      db1a74cb163b304f673c194adcc133e4

    • SHA1

      e08546ef2544b10cce83444156e75f2d8628370c

    • SHA256

      756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f

    • SHA512

      dcc476f616d0854dd585edadafe8773f6950a436bcfb9db14bd4432bd67f886ab7b83ba1e8c9ef921df09b4774a750b797dc26fa9e6c911f623fd40853f68716

    • SSDEEP

      3072:7RF+34S2+aSBZv6/E5u/15/BpstRZc97LL2v3KICN:tFKt2nS/vOLN5/P93L2v3

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks