General

  • Target

    SecuriteInfo.com.Variant.Lazy.509335.4668.31067.exe

  • Size

    89KB

  • Sample

    240412-rt5nzaeb8x

  • MD5

    d0fa79fc637c5916da8d7c2f07948933

  • SHA1

    d4fb639fe811739c4adf2e62b5df1f8c9ab35c75

  • SHA256

    1dc9190028637257765735e9e8956d0a2ef2710055fdfc873240c7f09098b7e9

  • SHA512

    68bca697a0cb607b6d813ddd4656afaa617384dbbafecda6b4f03685da8fba8603d761e0cb56841a778e59908064ff93261e80bc2f19f6898240d0b2dd65dd4c

  • SSDEEP

    1536:2PX4YBLPitzZgglqlwEmnFN+br133phXZ4gDjyAKrsTBLviJYPx5OSbDU9oBdh02:ZzZggAlwEAAbryXsTBTiJYPx5OSbEoBN

Malware Config

Extracted

Family

raccoon

Botnet

8401e21bbb0060afb24ce21fda90f5cb

C2

http://195.20.16.155:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      SecuriteInfo.com.Variant.Lazy.509335.4668.31067.exe

    • Size

      89KB

    • MD5

      d0fa79fc637c5916da8d7c2f07948933

    • SHA1

      d4fb639fe811739c4adf2e62b5df1f8c9ab35c75

    • SHA256

      1dc9190028637257765735e9e8956d0a2ef2710055fdfc873240c7f09098b7e9

    • SHA512

      68bca697a0cb607b6d813ddd4656afaa617384dbbafecda6b4f03685da8fba8603d761e0cb56841a778e59908064ff93261e80bc2f19f6898240d0b2dd65dd4c

    • SSDEEP

      1536:2PX4YBLPitzZgglqlwEmnFN+br133phXZ4gDjyAKrsTBLviJYPx5OSbDU9oBdh02:ZzZggAlwEAAbryXsTBTiJYPx5OSbEoBN

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks