General

  • Target

    2a7ba8c1f169b12753cf920b28a7db0e.bin

  • Size

    1.2MB

  • Sample

    240915-bllccsxgkg

  • MD5

    c726e7ea46bc321d69aa5a42c03f98a9

  • SHA1

    e9a80e72ace1bc06692b57e8a6e48342f2dd6f63

  • SHA256

    e88b8bddb5fc5c4455883490f1bdd4a63300b0b68008b6607ce956a11c240d53

  • SHA512

    a3ae820bfe8bd7a895c7f24561221acc0dbb7239bee2f98d77367ae142d35eed5f8624009a4549dc9a8910983abf31456bd60dce2be77c24d282c3fffdc4e4db

  • SSDEEP

    24576:fFnKJDI+2KAtUW5ewoNWLKui5uwKBCKHGh4knIPC9f:Nn4H9Ab5eDuiWB4h4Q

Malware Config

Extracted

Family

raccoon

Botnet

2ca5558c9ec8037d24a611513d7bd076

C2

https://192.153.57.177:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      acae26cfe00f442507c384c69eb5a85326754c214795becd65ad4e798e881a83.exe

    • Size

      1.6MB

    • MD5

      2a7ba8c1f169b12753cf920b28a7db0e

    • SHA1

      6a9b2f1e100bc6b31621951a293be4fd59b79937

    • SHA256

      acae26cfe00f442507c384c69eb5a85326754c214795becd65ad4e798e881a83

    • SHA512

      844abb5930b93f03bcd63b5e19b05a21b7f61600e7321ce259d1f99dc42c16cd3d34c3519f582f61b3a93bedb662ac1363497aac9d5d18c956caa01090c4ca64

    • SSDEEP

      49152:gEnRaINP03sRG/CQx0u+m9BcR1EZfuuW:gSa4P088xGYczrz

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks