General

  • Target

    bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0

  • Size

    9.9MB

  • Sample

    240825-yejxaa1eke

  • MD5

    98cd1e662396f29805d3730d477f5114

  • SHA1

    5e5356e534e8929f10c1be59e2855bf295081be4

  • SHA256

    bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0

  • SHA512

    0dd4afc3ef50000cf20344e9498f220669a44aa8adab1c576d2ee8e158898f2f12dd515b232186be7a29d6e9a1c6692a31c8c7520196b2d3e16a164cae140056

  • SSDEEP

    196608:zfk9DH2OOz6/gN9l6I+J2oywrAzxq2BYBC:7EWOOz6/gR6Oz0Azxq2BYBC

Malware Config

Extracted

Family

raccoon

Botnet

517bb0d640c1242c3f069aab3d1018d6

C2

http://51.195.166.178/

Attributes
  • user_agent

    TakeMyPainBack

xor.plain

Targets

    • Target

      bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0

    • Size

      9.9MB

    • MD5

      98cd1e662396f29805d3730d477f5114

    • SHA1

      5e5356e534e8929f10c1be59e2855bf295081be4

    • SHA256

      bce268f45b39e03bf8e6ef71ff1abcba5f80132ae58ef9ac94a01bb03d1f82f0

    • SHA512

      0dd4afc3ef50000cf20344e9498f220669a44aa8adab1c576d2ee8e158898f2f12dd515b232186be7a29d6e9a1c6692a31c8c7520196b2d3e16a164cae140056

    • SSDEEP

      196608:zfk9DH2OOz6/gN9l6I+J2oywrAzxq2BYBC:7EWOOz6/gR6Oz0Azxq2BYBC

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks