General

  • Target

    323721abf8944d47b096e21c141208de8ad4bdd3e63cabf171ec03a35974026c

  • Size

    6.1MB

  • Sample

    230930-jacj3sbb52

  • MD5

    94c48a90a871ed2b1e61e0bcd043438d

  • SHA1

    2ee786db7725ff1a2fa97d5e717e5bdabf51b97f

  • SHA256

    323721abf8944d47b096e21c141208de8ad4bdd3e63cabf171ec03a35974026c

  • SHA512

    717e5b7a2b79911cd806ff77860d761cf2da83b98747598bff81daf364353b7d48bcd1246af63145a558d4411dbfff3e20fd5b9f0ec33e78b2521c01d51dff08

  • SSDEEP

    196608:mURCLABMGC8FbjtbCgwLcKSz3dM5euASKnRcS:mRrRQhCAKSz3cm9nV

Malware Config

Extracted

Family

raccoon

Botnet

5e2505d8647542f05843f89ae7cd18e7

C2

http://5.75.241.110:80

xor.plain

Targets

    • Target

      323721abf8944d47b096e21c141208de8ad4bdd3e63cabf171ec03a35974026c

    • Size

      6.1MB

    • MD5

      94c48a90a871ed2b1e61e0bcd043438d

    • SHA1

      2ee786db7725ff1a2fa97d5e717e5bdabf51b97f

    • SHA256

      323721abf8944d47b096e21c141208de8ad4bdd3e63cabf171ec03a35974026c

    • SHA512

      717e5b7a2b79911cd806ff77860d761cf2da83b98747598bff81daf364353b7d48bcd1246af63145a558d4411dbfff3e20fd5b9f0ec33e78b2521c01d51dff08

    • SSDEEP

      196608:mURCLABMGC8FbjtbCgwLcKSz3dM5euASKnRcS:mRrRQhCAKSz3cm9nV

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks