General

  • Target

    c0acf031062c99ad91d69dd8913337a302510dcc49e9ee938abcb1c614856386.exe

  • Size

    469KB

  • Sample

    250117-h3yscaxkcl

  • MD5

    685104925e8da798f239b22d54689675

  • SHA1

    e4f115ddf7e03176d2dfab93c65d7c5b39c2e682

  • SHA256

    c0acf031062c99ad91d69dd8913337a302510dcc49e9ee938abcb1c614856386

  • SHA512

    1fefd5559b740926d0f848174abdbf8ae423576a49ad15d3ffe83af2b9f7a5568cd650d3c4ffc9a9add7b0cf0a1046dda471cbb88635609c459d65585ec79aa7

  • SSDEEP

    12288:A6jlhP4uVOeWkH7r5lIWqh0cURICpfHLjK:ZRV4uV//IWqhE3fH/K

Malware Config

Extracted

Family

raccoon

Botnet

faea3ab5ea06a40f0cc8f655e526972689ca1b1f

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1QQXAXArU8BU4kJZ6IBsSCCyLtmLftiOV

rc4.plain
rc4.plain

Targets

    • Target

      c0acf031062c99ad91d69dd8913337a302510dcc49e9ee938abcb1c614856386.exe

    • Size

      469KB

    • MD5

      685104925e8da798f239b22d54689675

    • SHA1

      e4f115ddf7e03176d2dfab93c65d7c5b39c2e682

    • SHA256

      c0acf031062c99ad91d69dd8913337a302510dcc49e9ee938abcb1c614856386

    • SHA512

      1fefd5559b740926d0f848174abdbf8ae423576a49ad15d3ffe83af2b9f7a5568cd650d3c4ffc9a9add7b0cf0a1046dda471cbb88635609c459d65585ec79aa7

    • SSDEEP

      12288:A6jlhP4uVOeWkH7r5lIWqh0cURICpfHLjK:ZRV4uV//IWqhE3fH/K

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks