General

  • Target

    0e10ea38b2c0569203a5f46efdec60dc.exe

  • Size

    5.3MB

  • Sample

    231007-a4msgaag97

  • MD5

    0e10ea38b2c0569203a5f46efdec60dc

  • SHA1

    2a85e47f44d07d52a55095c78b42127e290c5069

  • SHA256

    d4224f288dd203d784301459d37aed4a0e908f53b7b60b83c4d7f2b65cc007d1

  • SHA512

    29e909457cfeb8de60a9eecc3aed132bb59a5bfae8e81c76c414a54b5638500adf839e3bf0f26ee56d9bad2084c34a04886d0d35a64eb8761f0cc8449bdb8f35

  • SSDEEP

    49152:Z4VIxoeQOSWFdin2IVvjm/yw3mAa3/jFPP+EhEyh3cow384AEDiJUdoKtYlQuWpo:Z2IxoebxdOKW

Malware Config

Extracted

Family

raccoon

Botnet

5ff7bc68b712d0b2c95bc2d831e79eaf

C2

http://45.15.156.141:80

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Targets

    • Target

      0e10ea38b2c0569203a5f46efdec60dc.exe

    • Size

      5.3MB

    • MD5

      0e10ea38b2c0569203a5f46efdec60dc

    • SHA1

      2a85e47f44d07d52a55095c78b42127e290c5069

    • SHA256

      d4224f288dd203d784301459d37aed4a0e908f53b7b60b83c4d7f2b65cc007d1

    • SHA512

      29e909457cfeb8de60a9eecc3aed132bb59a5bfae8e81c76c414a54b5638500adf839e3bf0f26ee56d9bad2084c34a04886d0d35a64eb8761f0cc8449bdb8f35

    • SSDEEP

      49152:Z4VIxoeQOSWFdin2IVvjm/yw3mAa3/jFPP+EhEyh3cow384AEDiJUdoKtYlQuWpo:Z2IxoebxdOKW

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks