General

  • Target

    Topaz Video AI.zip

  • Size

    2.6MB

  • Sample

    240715-mx69rasfqk

  • MD5

    0f7d5f4906bfc2d438111558f1c8f2c2

  • SHA1

    1c81b7e5dd7e7ecbf2bfbfa37505f2cc149de5ba

  • SHA256

    5ca5180295a5c8f303c77d1a92915749bb464d7a53364fde60b177d103456a04

  • SHA512

    28c8920dab9a5c982ff634b712b73b7827f8544fb515c794e428ae1273fca8728fd9e93ed62d1b230e9655cbe9f3f48ca245816fe29da06a8184097f6ef8b5f9

  • SSDEEP

    49152:49OAdTOlpnBVwd26Tz+6I37qUbSVh1SSa6wrWmY9Vj:COAdK5yd263Pr0mv3X5m0

Malware Config

Extracted

Family

raccoon

Botnet

dd188c0be5001b2c8fb76d74174694cd

C2

http://147.45.44.25:80/

http://85.28.47.116:80/

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      Topaz Video AI.exe

    • Size

      702.2MB

    • MD5

      52c92decb851e99079c17568be886854

    • SHA1

      f2f5dbfbd05a774da037415794e85cc99270148c

    • SHA256

      8b69e17d0ee711d5e5c10118a9c5096997d44fff70d8e1b0dcc7802b181f6e87

    • SHA512

      dd2a084bc974b5d7d8b8692b317c92cbe87aad39e99c8ada2e83c6fde25975faa6fd7bef744a719dd655f3f70fee1b380075872d7cc3c81f823db93d15aa29bd

    • SSDEEP

      49152:MJ8U/HLU3Yp7dPM8V/HLU3Yp7CgUxK3h7/SEyIas8JWsa6HdLK:MJ8U/HQ3r8V/HQ3BbxKxD9jXsj9LK

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks