General

  • Target

    975b56ef3e49280bf9a42346c7a3d2d89a80616cabdcb455c4a8ca2f92bf9cea

  • Size

    647KB

  • Sample

    240928-qc8tmaxcrp

  • MD5

    7c5e5dfdeef2b7b007b601aa10d6d20a

  • SHA1

    9702d3045dc96b2ea6cd841087fb5e403305cc58

  • SHA256

    975b56ef3e49280bf9a42346c7a3d2d89a80616cabdcb455c4a8ca2f92bf9cea

  • SHA512

    ebce3f8a02e59738c4e2b95a2915c8a447d71b79a1b892db563d500c78ce1d9bd5d420e8c446126916ef265640da89e2933b4404995c88181f5711d5fc3811e9

  • SSDEEP

    12288:Fth5o+TIhJO3fKDEyw5JVf26myc0WxHqv9:Hh5o+/fRyw5j2pycHxK

Malware Config

Extracted

Family

raccoon

Botnet

5a197ee9aa9b7ac9ed327df1dc3bc363ed70f60b

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1JCIgfgCCpW9UnvNQKw8JbgPItvjQLzs1

rc4.plain
rc4.plain

Targets

    • Target

      975b56ef3e49280bf9a42346c7a3d2d89a80616cabdcb455c4a8ca2f92bf9cea

    • Size

      647KB

    • MD5

      7c5e5dfdeef2b7b007b601aa10d6d20a

    • SHA1

      9702d3045dc96b2ea6cd841087fb5e403305cc58

    • SHA256

      975b56ef3e49280bf9a42346c7a3d2d89a80616cabdcb455c4a8ca2f92bf9cea

    • SHA512

      ebce3f8a02e59738c4e2b95a2915c8a447d71b79a1b892db563d500c78ce1d9bd5d420e8c446126916ef265640da89e2933b4404995c88181f5711d5fc3811e9

    • SSDEEP

      12288:Fth5o+TIhJO3fKDEyw5JVf26myc0WxHqv9:Hh5o+/fRyw5j2pycHxK

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks