General

  • Target

    938f7cec3d193f122c3454462125c526188cac7d6df5c317a1b2f0205ea03a79N.exe

  • Size

    406KB

  • Sample

    250215-2qq2hsykbn

  • MD5

    fed8b82648b5c70d7a8f4e0e28a2d150

  • SHA1

    40a4d42a30da69fe0a0ca1c84eb14517680efa49

  • SHA256

    938f7cec3d193f122c3454462125c526188cac7d6df5c317a1b2f0205ea03a79

  • SHA512

    43775116b05df1eefc79a3e856c7d90912bca09904d63f927b2e108445f70f6b544d674c9eef3bb14fa59ad6acccbad08cc49f92a2bb1a0835586fd27ceda264

  • SSDEEP

    12288:+eCC68kSBNSGhQK3b+910DbEo3fQ6eBZY0lVJg:Z68X6Gv+0DbEMfQl7rlng

Malware Config

Extracted

Family

raccoon

Botnet

d0a4bfbf53b7cfb0f2c36ea3dac687a23a8d514e

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1bFIJe6mzezYRts1ADNHaG0Wi8T1yMIYo

rc4.plain
rc4.plain

Targets

    • Target

      938f7cec3d193f122c3454462125c526188cac7d6df5c317a1b2f0205ea03a79N.exe

    • Size

      406KB

    • MD5

      fed8b82648b5c70d7a8f4e0e28a2d150

    • SHA1

      40a4d42a30da69fe0a0ca1c84eb14517680efa49

    • SHA256

      938f7cec3d193f122c3454462125c526188cac7d6df5c317a1b2f0205ea03a79

    • SHA512

      43775116b05df1eefc79a3e856c7d90912bca09904d63f927b2e108445f70f6b544d674c9eef3bb14fa59ad6acccbad08cc49f92a2bb1a0835586fd27ceda264

    • SSDEEP

      12288:+eCC68kSBNSGhQK3b+910DbEo3fQ6eBZY0lVJg:Z68X6Gv+0DbEMfQl7rlng

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Downloads MZ/PE file

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks