General

  • Target

    3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe

  • Size

    568KB

  • Sample

    250224-zgr64svjx8

  • MD5

    a20ae517e382600d758d3e9ddfbb9a50

  • SHA1

    e122fb6f9bb149587767fba46dfdf157b958aad2

  • SHA256

    3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3e

  • SHA512

    a175a98abe5b79c093481131a52c17843608ac021f3a30045e7d8f5e328e483923454623c9e0f23cc72740097e95d91912438ab9bbf55cc908809e4bc37e2c0e

  • SSDEEP

    12288:d1ksXDvf90b7H2jCwnEu+e/RrCmzpg3/B0CK:dus2PH2jCwn/aUpQ//K

Malware Config

Extracted

Family

raccoon

Botnet

40594c0540992a540cc9a4e601051a3a7e88dcf7

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1I7jmFhJY4KCn0dqAcr5L-h-D70KGZkaF

rc4.plain
rc4.plain

Targets

    • Target

      3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe

    • Size

      568KB

    • MD5

      a20ae517e382600d758d3e9ddfbb9a50

    • SHA1

      e122fb6f9bb149587767fba46dfdf157b958aad2

    • SHA256

      3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3e

    • SHA512

      a175a98abe5b79c093481131a52c17843608ac021f3a30045e7d8f5e328e483923454623c9e0f23cc72740097e95d91912438ab9bbf55cc908809e4bc37e2c0e

    • SSDEEP

      12288:d1ksXDvf90b7H2jCwnEu+e/RrCmzpg3/B0CK:dus2PH2jCwn/aUpQ//K

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks