General

  • Target

    27bbe321eafd71585b930189223716adedd1119927a5e0d9bb50a87bc9d96f93.exe

  • Size

    568KB

  • Sample

    250225-kzp25s1pt3

  • MD5

    469d183e19b44083a91a5f230b6962e9

  • SHA1

    520c616a5f84718532ad3dfcddb84ed5bdb87762

  • SHA256

    27bbe321eafd71585b930189223716adedd1119927a5e0d9bb50a87bc9d96f93

  • SHA512

    0e58d782ecbbb399b99c2b76a38877524dccbe2afe18d0fb43bf290c7f21c00cde654d0ed1cfc523169ae5bf76c9120f67d7f60366f59f213352a88559e6b80f

  • SSDEEP

    12288:d1ksXDvf90b7H2jCwnEu+e/RrCmzpg3/B0CKv:dus2PH2jCwn/aUpQ//Kv

Malware Config

Extracted

Family

raccoon

Botnet

40594c0540992a540cc9a4e601051a3a7e88dcf7

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1I7jmFhJY4KCn0dqAcr5L-h-D70KGZkaF

rc4.plain
rc4.plain

Targets

    • Target

      27bbe321eafd71585b930189223716adedd1119927a5e0d9bb50a87bc9d96f93.exe

    • Size

      568KB

    • MD5

      469d183e19b44083a91a5f230b6962e9

    • SHA1

      520c616a5f84718532ad3dfcddb84ed5bdb87762

    • SHA256

      27bbe321eafd71585b930189223716adedd1119927a5e0d9bb50a87bc9d96f93

    • SHA512

      0e58d782ecbbb399b99c2b76a38877524dccbe2afe18d0fb43bf290c7f21c00cde654d0ed1cfc523169ae5bf76c9120f67d7f60366f59f213352a88559e6b80f

    • SSDEEP

      12288:d1ksXDvf90b7H2jCwnEu+e/RrCmzpg3/B0CKv:dus2PH2jCwn/aUpQ//Kv

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks