General

  • Target

    432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9

  • Size

    257KB

  • Sample

    230731-s24mbaab4v

  • MD5

    9494e546b003b80987a521858553242c

  • SHA1

    6bdf37f9bcab9340a1658a27a11ea96b9f290a0d

  • SHA256

    432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9

  • SHA512

    4a18355886929fba9729f34f876b5df47391ba3b92014f068623bef3dd335eb153c30bdcf232e7b88677219ef43d0a3e37970870ebdc6a9a3e95478005338f1a

  • SSDEEP

    3072:NnRF0+Pf2fNuZIeYY8ltlyOqMf3Z+e8AnJgwjtIMmC4lHD7j1s:NRF3X2VuZVYTltJ/+e8AnJZtIMrOx

Malware Config

Extracted

Family

raccoon

Botnet

c610d498a9c34173052f3f4fcea051af

C2

http://galandskiyher1.com:80/

xor.plain

Targets

    • Target

      432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9

    • Size

      257KB

    • MD5

      9494e546b003b80987a521858553242c

    • SHA1

      6bdf37f9bcab9340a1658a27a11ea96b9f290a0d

    • SHA256

      432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9

    • SHA512

      4a18355886929fba9729f34f876b5df47391ba3b92014f068623bef3dd335eb153c30bdcf232e7b88677219ef43d0a3e37970870ebdc6a9a3e95478005338f1a

    • SSDEEP

      3072:NnRF0+Pf2fNuZIeYY8ltlyOqMf3Z+e8AnJgwjtIMmC4lHD7j1s:NRF3X2VuZVYTltJ/+e8AnJZtIMrOx

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks