General

  • Target

    bfabcbe0d45993c27b094ba4e061e3442836a6eaf2362cd7817aa8caf7b5a694.exe

  • Size

    539KB

  • Sample

    250115-292mcszjb1

  • MD5

    0fbdb59136f904e0e2b8a53c20739247

  • SHA1

    ff51455a4ab118701eaa228bd5b0b59c7ec39426

  • SHA256

    bfabcbe0d45993c27b094ba4e061e3442836a6eaf2362cd7817aa8caf7b5a694

  • SHA512

    47ab982001f60ab40e3130f24e9d3ccc8b57eaaa41f594f0cc1e5aa9828c22d4540a0c40013198a9fe6cace797b8aaf18358c3cf2b335912ec95ba464f118476

  • SSDEEP

    12288:1NEBfifG/Rr1lpJBxn3BDAW6YVfFA0GtSuSdeZ1ZfMnXP4qA0HE:EP5rpxJr6W7GJyeZ1ZknXP4qA0HE

Malware Config

Extracted

Family

raccoon

Botnet

e89531715fcaecf579e6c8b392dce4a0144dc21b

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1QQXAXArU8BU4kJZ6IBsSCCyLtmLftiOV

rc4.plain
rc4.plain

Targets

    • Target

      bfabcbe0d45993c27b094ba4e061e3442836a6eaf2362cd7817aa8caf7b5a694.exe

    • Size

      539KB

    • MD5

      0fbdb59136f904e0e2b8a53c20739247

    • SHA1

      ff51455a4ab118701eaa228bd5b0b59c7ec39426

    • SHA256

      bfabcbe0d45993c27b094ba4e061e3442836a6eaf2362cd7817aa8caf7b5a694

    • SHA512

      47ab982001f60ab40e3130f24e9d3ccc8b57eaaa41f594f0cc1e5aa9828c22d4540a0c40013198a9fe6cace797b8aaf18358c3cf2b335912ec95ba464f118476

    • SSDEEP

      12288:1NEBfifG/Rr1lpJBxn3BDAW6YVfFA0GtSuSdeZ1ZfMnXP4qA0HE:EP5rpxJr6W7GJyeZ1ZknXP4qA0HE

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks