General

  • Target

    acae26cfe00f442507c384c69eb5a85326754c214795becd65ad4e798e881a83.zip

  • Size

    1.2MB

  • Sample

    250406-vczceawnw4

  • MD5

    6196645db80a7e896ee123cc82ffea43

  • SHA1

    e1dc33111f34ff72ddb05410e525a98921e2da1d

  • SHA256

    8bf334a7fc670a14a81a691e47b36efe8279816f67e297a277f98b81745c4fc8

  • SHA512

    ca6226bb5898c27dcdff0be8c0e03a5d4e2be4171aee4fa3e1b1c63c52127f2fce8f586d73e686c4cfa41eb73571c0ee177c3d3635b74bef28cd5c362f88ee19

  • SSDEEP

    24576:H3sQw2Ux/ieuyuv5jONoWP/QAssf0cUE/E+fNRBHfNH7424PG+PnU:H3xwkebi5jON/Pz3txEMRtVc24s

Malware Config

Extracted

Family

raccoon

Botnet

2ca5558c9ec8037d24a611513d7bd076

C2

https://192.153.57.177:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Targets

    • Target

      acae26cfe00f442507c384c69eb5a85326754c214795becd65ad4e798e881a83.exe

    • Size

      1.6MB

    • MD5

      2a7ba8c1f169b12753cf920b28a7db0e

    • SHA1

      6a9b2f1e100bc6b31621951a293be4fd59b79937

    • SHA256

      acae26cfe00f442507c384c69eb5a85326754c214795becd65ad4e798e881a83

    • SHA512

      844abb5930b93f03bcd63b5e19b05a21b7f61600e7321ce259d1f99dc42c16cd3d34c3519f582f61b3a93bedb662ac1363497aac9d5d18c956caa01090c4ca64

    • SSDEEP

      49152:gEnRaINP03sRG/CQx0u+m9BcR1EZfuuW:gSa4P088xGYczrz

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks