General

  • Target

    b2ba021cf5e3abc40f1108b8467f280b164e2a5e5e2b143878a43185b9e09b65

  • Size

    680KB

  • Sample

    241221-t61lwstlaq

  • MD5

    329728e98ce42c505128163a1a5feba4

  • SHA1

    2febd5132996ca9c0103a91605b3efae1296243f

  • SHA256

    b2ba021cf5e3abc40f1108b8467f280b164e2a5e5e2b143878a43185b9e09b65

  • SHA512

    2807774ba68427cec80f22d75867e7b1372a9ff7219f69d79cda55bad345edb6afb1fedba04179472722f902036b8bcf6f8780f849d18bfaf577136db228d57d

  • SSDEEP

    12288:UdeRen3/xd0UGAFzwn52welvWRVOWUjecnkXd6AyWDuMnx:UdfvFGAyn5Gecn/Ajx

Malware Config

Extracted

Family

raccoon

Botnet

afb5c633c4650f69312baef49db9dfa4

C2

http://77.73.132.84

Attributes
  • user_agent

    mozzzzzzzzzzz

rc4.plain

Targets

    • Target

      84a41e5aff87e70f3851ccaf046b83396cefbe5d5b4741d4cb4ad90f5512c0d7

    • Size

      1.4MB

    • MD5

      e8328c08f484230958094f54f3ef2874

    • SHA1

      d91dbcfadc06b4010e6e1ef6019040f3805715e2

    • SHA256

      84a41e5aff87e70f3851ccaf046b83396cefbe5d5b4741d4cb4ad90f5512c0d7

    • SHA512

      ebc141e010459c74eedf2005bf1c62e7260bf19d96cdabb33695be36979aab3ff915e608ab7adbb06ca9d2c9be861ffd6794e2b31f5eaf0b566d8d76b3eb843d

    • SSDEEP

      24576:rk8gmqh7swb4tnsvkZYVFVVWYgbUf8vaz+WOucFvem:rWB7rFDp1cFm

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks