General

  • Target

    45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe

  • Size

    2.6MB

  • Sample

    240213-djqkeafa72

  • MD5

    38439fdf4744c8a97c0dafce36e4f432

  • SHA1

    e6f56833ecfb2b47f4e39a290bad959776fea2f1

  • SHA256

    45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503

  • SHA512

    69feeaeb83ee5b6773e2919716d9ab2f4acee2f6115ef1731557258f42a5b529760402a091c64be1707a13c4b4cfb09e79ddb0eff24cd3e77fa1e4b355cda407

  • SSDEEP

    49152:01+6+AFUaW+Vvdj8Lf8JtKHibnPIb2qohbLLkYPTRAEOOaS4d5eTovYuLL:XANzVvdw4Jr76oNLpPNAEkeTYpLL

Malware Config

Extracted

Family

raccoon

Botnet

2637bf45ccfc8a2d57025feab0be0b31

C2

http://194.116.173.154:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503.exe

    • Size

      2.6MB

    • MD5

      38439fdf4744c8a97c0dafce36e4f432

    • SHA1

      e6f56833ecfb2b47f4e39a290bad959776fea2f1

    • SHA256

      45c1e993dbcdef4111153f9c6ad3eb07a1bd8b50cb6164e4d55098412dfd4503

    • SHA512

      69feeaeb83ee5b6773e2919716d9ab2f4acee2f6115ef1731557258f42a5b529760402a091c64be1707a13c4b4cfb09e79ddb0eff24cd3e77fa1e4b355cda407

    • SSDEEP

      49152:01+6+AFUaW+Vvdj8Lf8JtKHibnPIb2qohbLLkYPTRAEOOaS4d5eTovYuLL:XANzVvdw4Jr76oNLpPNAEkeTYpLL

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables manipulated with Fody

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks