General

  • Target

    8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058

  • Size

    39.9MB

  • Sample

    240321-1dg3eaah37

  • MD5

    fd8058fe93fa938472722334f497e920

  • SHA1

    9d56a463fb795a3e87b6063d554aa5538a9b31c6

  • SHA256

    8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058

  • SHA512

    d6179132f6bec008a8e84422aa5575bfa97f6e5c0dc6ae18508087c68e67de66896cc11659807ef54305fc4cac8c15626eb013ae62795143b044d87b94c8721b

  • SSDEEP

    786432:HpP1TvbDChk+IOyS5Lir9d+woWNo9khkO5yajOAEbPA0GVRbJuah60m1G3Zr0rH:JtrnCFySCd2WhhkO5yuBwY0GVxjh60Cf

Malware Config

Extracted

Family

raccoon

Botnet

d4dfe058bb722373a292317097b425f0

C2

http://37.49.230.152:80

http://37.49.230.219:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058

    • Size

      39.9MB

    • MD5

      fd8058fe93fa938472722334f497e920

    • SHA1

      9d56a463fb795a3e87b6063d554aa5538a9b31c6

    • SHA256

      8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058

    • SHA512

      d6179132f6bec008a8e84422aa5575bfa97f6e5c0dc6ae18508087c68e67de66896cc11659807ef54305fc4cac8c15626eb013ae62795143b044d87b94c8721b

    • SSDEEP

      786432:HpP1TvbDChk+IOyS5Lir9d+woWNo9khkO5yajOAEbPA0GVRbJuah60m1G3Zr0rH:JtrnCFySCd2WhhkO5yuBwY0GVxjh60Cf

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks