General

  • Target

    595aefb01f819eeef533258c04af5487164119bdd92bcd735a26de9f5935832d

  • Size

    227KB

  • Sample

    231002-wt1r8sfc39

  • MD5

    9f27c6f115a1d6e235f924c9ddff389a

  • SHA1

    c81c725574d10ae463eded47c6592b5e3130f537

  • SHA256

    595aefb01f819eeef533258c04af5487164119bdd92bcd735a26de9f5935832d

  • SHA512

    b2f2fb0bd3bb3b268de40633e0b1fe3147b52a8146e8790a4f3d454d70316a62f3062fae2a1cc19007deef1515eada574abc755e445f2dcaae2d1beb8bd8ceb8

  • SSDEEP

    3072:WVSdFy0/mDsbutPFlE59epTj5SnDqXo9ubqTTZ5ctffy6JpvboB:UtBDntdoaKWWKi6Jpv

Malware Config

Extracted

Family

raccoon

Botnet

9c05379df6f1d02ae49f9ee18aad8c17

C2

http://5.78.80.43:8388/

xor.plain

Targets

    • Target

      595aefb01f819eeef533258c04af5487164119bdd92bcd735a26de9f5935832d

    • Size

      227KB

    • MD5

      9f27c6f115a1d6e235f924c9ddff389a

    • SHA1

      c81c725574d10ae463eded47c6592b5e3130f537

    • SHA256

      595aefb01f819eeef533258c04af5487164119bdd92bcd735a26de9f5935832d

    • SHA512

      b2f2fb0bd3bb3b268de40633e0b1fe3147b52a8146e8790a4f3d454d70316a62f3062fae2a1cc19007deef1515eada574abc755e445f2dcaae2d1beb8bd8ceb8

    • SSDEEP

      3072:WVSdFy0/mDsbutPFlE59epTj5SnDqXo9ubqTTZ5ctffy6JpvboB:UtBDntdoaKWWKi6Jpv

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks