General

  • Target

    Bankcopy_307144_2020-04-15_DE_E-INVOICE_20-613129926-12.hta

  • Size

    10KB

  • Sample

    200415-jcknfzjgvj

  • MD5

    09e4c471fc24da25b0ef0dd07bc0942f

  • SHA1

    3af39c106bb82a0c1abae7dfc33e2f0cb37b60d6

  • SHA256

    f80ee9bd806bacbf7994f8a2c6996de33979b12f46923cfa3e3e8e534738aee4

  • SHA512

    79f689cfc92d2260fcb62b8e87ba0acb6a4a688463ddbea7f405954512190c9e24d4985006232e6fcd93d0bba9f7b74fee1a77f50075dd597f6b6a1cea4490cd

Malware Config

Extracted

Path

C:\Users\Admin\AppData\LocalLow\machineinfo.txt

Family

raccoon

Ransom Note
[Raccoon Stealer] - v1.5 Release Build compiled on Tue Apr 7 15:04:24 2020 Launched at: 2020.04.15 - 11:28:16 GMT Bot_ID: 24232A4E-4B86-47C9-8A07-5A58937018F4_Admin Running on a desktop =R=A=C=C=O=O=N= System Information: - System Language: English - System TimeZone: -0 hrs - ComputerName: BKIWADLA - Username: Admin - IP: 154.61.71.13 - Windows version: NT 6.1 - Product name: Windows 7 Professional - System arch: x64 - CPU: Persocon Processor 2.5+ (2 cores) - RAM: 2047 MB (397 MB used) - Screen resolution: 1280x720 - Display devices: 0) Standard VGA Graphics Adapter ============

Extracted

Family

raccoon

Botnet

ff236091d9fbac249beeec4137efd72b5327efd9

C2

http://35.240.36.208/gate/log.php

Attributes
  • url4cnc

    https://drive.google.com/uc?export=download&id=12JPrOMXQIwvLmvbb60igt1JLe1WETE6M

rc4.plain
rc4.plain

Targets

    • Target

      Bankcopy_307144_2020-04-15_DE_E-INVOICE_20-613129926-12.hta

    • Size

      10KB

    • MD5

      09e4c471fc24da25b0ef0dd07bc0942f

    • SHA1

      3af39c106bb82a0c1abae7dfc33e2f0cb37b60d6

    • SHA256

      f80ee9bd806bacbf7994f8a2c6996de33979b12f46923cfa3e3e8e534738aee4

    • SHA512

      79f689cfc92d2260fcb62b8e87ba0acb6a4a688463ddbea7f405954512190c9e24d4985006232e6fcd93d0bba9f7b74fee1a77f50075dd597f6b6a1cea4490cd

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies system certificate store

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks