General

  • Target

    d399b62581b6f74bc812834094e0f0cf1389cbfa57e31ad7611925b192e7c3a3N.exe

  • Size

    533KB

  • Sample

    250103-mydc3asmcj

  • MD5

    4d9050480858b50c210d13e097ccddf0

  • SHA1

    dcd1e8a655c6c33f9c594bb0ca0680ba6c6a4634

  • SHA256

    d399b62581b6f74bc812834094e0f0cf1389cbfa57e31ad7611925b192e7c3a3

  • SHA512

    841f946a4c5e9a4828d13070bb30b149f4561e2190dce0cee60a04f06ed56bf35ef2147ba751094925b8746a39e6efa96c571bdca63f340bb64bf946351f630e

  • SSDEEP

    12288:irDzmcULplswomNNhHNrztvjkDJjuscV:irDz5UwxmZxdkDJqsc

Malware Config

Extracted

Family

raccoon

Botnet

5d224fd6c26c50ca4fea125e43d52eff1b8373e6

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1qOwjltN62v2z1O2ar8qbu8ru2QwxaRnr

rc4.plain
rc4.plain

Targets

    • Target

      d399b62581b6f74bc812834094e0f0cf1389cbfa57e31ad7611925b192e7c3a3N.exe

    • Size

      533KB

    • MD5

      4d9050480858b50c210d13e097ccddf0

    • SHA1

      dcd1e8a655c6c33f9c594bb0ca0680ba6c6a4634

    • SHA256

      d399b62581b6f74bc812834094e0f0cf1389cbfa57e31ad7611925b192e7c3a3

    • SHA512

      841f946a4c5e9a4828d13070bb30b149f4561e2190dce0cee60a04f06ed56bf35ef2147ba751094925b8746a39e6efa96c571bdca63f340bb64bf946351f630e

    • SSDEEP

      12288:irDzmcULplswomNNhHNrztvjkDJjuscV:irDz5UwxmZxdkDJqsc

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks