General

  • Target

    IDMan.rar

  • Size

    1.4MB

  • Sample

    240715-n72yfswgmr

  • MD5

    8d8fd830c89d8d575ef2ce686e938746

  • SHA1

    3f960dca95831a87b06196d1f28b5bd7f0d945cb

  • SHA256

    51173c571dfb12777d7adc8bfd192b741c6989802ea7f5adc8b69d70bcdfd27b

  • SHA512

    15eb48f4a5a93b605440008ff944568cc7f4c30fdf1ea77935dc59fba62e5fe5df6e01782dae00aea14c5374c2a880a562a0d4ada2c8a09db77c12fdc869874a

  • SSDEEP

    24576:ZOrTHUmcpjJNk6g80oefhouQVce8eSZpir5TPpk5opZ3FT/lkYyc41:Z6UR5Lk40hfhouQVdSZkr5rn7F/tycK

Malware Config

Extracted

Family

raccoon

Botnet

dd188c0be5001b2c8fb76d74174694cd

C2

http://147.45.44.25:80/

http://85.28.47.116:80/

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      IDMan.exe

    • Size

      702.2MB

    • MD5

      52c92decb851e99079c17568be886854

    • SHA1

      f2f5dbfbd05a774da037415794e85cc99270148c

    • SHA256

      8b69e17d0ee711d5e5c10118a9c5096997d44fff70d8e1b0dcc7802b181f6e87

    • SHA512

      dd2a084bc974b5d7d8b8692b317c92cbe87aad39e99c8ada2e83c6fde25975faa6fd7bef744a719dd655f3f70fee1b380075872d7cc3c81f823db93d15aa29bd

    • SSDEEP

      49152:MJ8U/HLU3Yp7dPM8V/HLU3Yp7CgUxK3h7/SEyIas8JWsa6HdLK:MJ8U/HQ3r8V/HQ3BbxKxD9jXsj9LK

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks