General

  • Target

    f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471

  • Size

    257KB

  • Sample

    230731-p75j1sgg2z

  • MD5

    bf7d48747998c636f443ab40e5318606

  • SHA1

    8f23e2805fb519d9db45e1b78bd8c2f9ac02c6bd

  • SHA256

    f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471

  • SHA512

    31dbf067ab2d0e44d048560acb115c6043851e9fcd38a9d8000392c2919429707f182f7a4f648d1c61b5921f2ee1caa88d21826ebde071a991b1da40a4952761

  • SSDEEP

    3072:qzRFIg+n32L6cgHgg2lDTnlyOno2g+1MiRfKytq4f1ZDH9Opd:qlFW322cgAgATnJo2h5Zttq4Ls

Malware Config

Extracted

Family

raccoon

Botnet

c610d498a9c34173052f3f4fcea051af

C2

http://galandskiyher1.com:80/

xor.plain

Targets

    • Target

      f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471

    • Size

      257KB

    • MD5

      bf7d48747998c636f443ab40e5318606

    • SHA1

      8f23e2805fb519d9db45e1b78bd8c2f9ac02c6bd

    • SHA256

      f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471

    • SHA512

      31dbf067ab2d0e44d048560acb115c6043851e9fcd38a9d8000392c2919429707f182f7a4f648d1c61b5921f2ee1caa88d21826ebde071a991b1da40a4952761

    • SSDEEP

      3072:qzRFIg+n32L6cgHgg2lDTnlyOno2g+1MiRfKytq4f1ZDH9Opd:qlFW322cgAgATnJo2h5Zttq4Ls

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks