General

  • Target

    severalstealers.zip

  • Size

    2.2MB

  • Sample

    231127-rrpvqshb2t

  • MD5

    c0e424a1793539ac33e07d7d95435e95

  • SHA1

    661b87538482f7483a02e18a7ea59741e5805ed5

  • SHA256

    f5093d421a1e894aebeebcbd2a724b618eb6febe6d179c44063566d4a1b1f611

  • SHA512

    331a411e6c36e8766f2bb48b1f6ef78ce16859726fb08ba95553f41873ac308c3f5cdbd92a24e441ebecd5ae1ec74c29e76286dafd2076750bc18b80446a8076

  • SSDEEP

    49152:8cP/Yp/6sUGiqR6sPDj9NmqwoMEgQuA2uuRoh27uavP:MAmj9wqwoJ2XH

Malware Config

Extracted

Family

raccoon

Botnet

a95204dfc046767be08c19284b5fa96b442bac02

Attributes
  • url4cnc

    http://185.163.204.81/yeswemaf

    http://194.180.191.33/yeswemaf

    http://174.138.11.98/yeswemaf

    http://194.180.191.44/yeswemaf

    http://91.219.236.120/yeswemaf

    https://t.me/yeswemaf

rc4.plain
rc4.plain

Targets

    • Target

      LaunchGenerator.exe

    • Size

      4.3MB

    • MD5

      627d82750b160ef011f454b4f89da531

    • SHA1

      1745c41d2af5b44a628f1eb4e8282343520e6df5

    • SHA256

      d5be51a192a63b24a7bd27cc757b94f414ad9f0ce4af2dcbb5b09a002dbd6b01

    • SHA512

      fc3121856341fd444bcf118fb7cc57bfe0edc4900e349b049f594724371361d1b1fbd4faa6510e6cd6a5fbf4158be25ab55efe634356628da6452d284eb9e0e7

    • SSDEEP

      98304:Ss8+qwJb/57aEHonzWsEReNBFVxEvw4+x6U4TOFEWHrTLZr7UD9ybPNkQBeR/LGK:hWnzWsERKBDC4THz9UD9YeR/y+EiIZsN

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks