General

  • Target

    63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006

  • Size

    257KB

  • Sample

    230731-tm6zkahd37

  • MD5

    a23f17607b1c7f209dd5eebc974886a8

  • SHA1

    8e589283d9713526059d58c326959ca6bf88a264

  • SHA256

    63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006

  • SHA512

    0fd7e3e6e09df001bf17098957b221ccbc07547ab9206ff5e850c94045f2f76243994546ffb0bfd72ccfc1ee8086526d28e638bcc29c516a59df6045301d1fe3

  • SSDEEP

    3072:SRF07Rd1VNx4r2otf3Whp0FVNoVKru2lLH4jsuFO6Or8LEbw:wFST1VNx4rpuhTVKa2pEdIr/

Malware Config

Extracted

Family

raccoon

Botnet

c610d498a9c34173052f3f4fcea051af

C2

http://galandskiyher1.com:80/

xor.plain

Targets

    • Target

      63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006

    • Size

      257KB

    • MD5

      a23f17607b1c7f209dd5eebc974886a8

    • SHA1

      8e589283d9713526059d58c326959ca6bf88a264

    • SHA256

      63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006

    • SHA512

      0fd7e3e6e09df001bf17098957b221ccbc07547ab9206ff5e850c94045f2f76243994546ffb0bfd72ccfc1ee8086526d28e638bcc29c516a59df6045301d1fe3

    • SSDEEP

      3072:SRF07Rd1VNx4r2otf3Whp0FVNoVKru2lLH4jsuFO6Or8LEbw:wFST1VNx4rpuhTVKa2pEdIr/

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks