General

  • Target

    1aa954280ff704582990fa686a91f1d142b21000a36a5.exe.zip

  • Size

    17.0MB

  • Sample

    241107-vz1hzswkct

  • MD5

    80774216a259709e2772106f483caf65

  • SHA1

    734d4ea7bdcf92cc0c998864f84804ba1223ad3f

  • SHA256

    8a233bed0b1e2cd2eebb74dd8a49dffebb22b852cd7ebeafebc1d3c40c0e8f5f

  • SHA512

    4662caed24e7489ecddd2c94a6aacb06ae8be0d46c540ef5a5c1c6fda6c5c542889054bb5a36a05dec5dabd096d411ddd8f6795ee6965e9fb3e5a9082b424ae5

  • SSDEEP

    393216:0BPUh2gnmnF+OVQUVstsWHv7lvVc7eOoNsxT8sksZtl2Vq:Ish7+cOVZVsNP7lvayNsxT8skQgk

Malware Config

Extracted

Family

raccoon

Botnet

5937a1bd499cd3cb596ec1995a9baf6a

C2

http://94.228.169.161:80/

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      1aa954280ff704582990fa686a91f1d142b21000a36a5.exe.bin

    • Size

      17.9MB

    • MD5

      48b7e5a3b1f5ffb2aaecc7ff5d8e3d97

    • SHA1

      689aeb40df545d3ef9f0dbe85cca836a6d0ce8f5

    • SHA256

      1aa954280ff704582990fa686a91f1d142b21000a36a55794cb5dfba05274eb5

    • SHA512

      c984e1888c847aada0f5e5eeabcee8ebbce66ba86dde46e00bff47e90ba2cf44585758c021f3d19098b161abb9d22a0249250ac67ea5f73bbed455344ab8196c

    • SSDEEP

      393216:aV+4mXtJ0Nm8ealfbIX8vEBQvefBj0Mos7hvvTXv3s6x6TmJfSg:s2SmwDIMSVBwMf9Hjv3sBTm0g

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Raccoon family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks