Resubmissions

27-02-2020 14:31

200227-bkpn15vpg2 10

21-02-2020 16:28

200221-rpakr52wfa 10

20-02-2020 19:36

200220-tp5ealxpvx 10

Analysis

  • max time kernel
    107s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    21-02-2020 16:28

General

  • Target

    1157719080.EXE

  • Size

    878KB

  • MD5

    7e70e99390a74ad36bfd7b82f8f6df7e

  • SHA1

    404d5850b8967259d778c796a0720abe35018d98

  • SHA256

    09f6673d04fa445820e1279aa202acde6e33066f2bfb135dd6458fe41398a222

  • SHA512

    c31f71dae0624f30ff1f23640168a769dfb14ff7f8cabf01aa0a3ae4465b1e56f67a12c9bf84b39bb24897ea25ad4144253be2f50ffb640a008e1fcfbaf48226

Malware Config

Extracted

Family

raccoon

Botnet

3dbd762906e1b32ddcb1ca61554f89c2f5686d2c

C2

http://104.248.18.25/gate/log.php

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=1-sIY2_CjYF5N7Cc4kIq7R17orSgXQ5Y6

rc4.plain
rc4.plain

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1157719080.EXE
    "C:\Users\Admin\AppData\Local\Temp\1157719080.EXE"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1844
    • C:\Users\Admin\AppData\Local\Temp\1157719080.EXE
      "C:\Users\Admin\AppData\Local\Temp\1157719080.EXE"
      2⤵
      • Modifies system certificate store
      PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1852-0-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB

  • memory/1852-1-0x0000000000400000-0x0000000000489000-memory.dmp

    Filesize

    548KB