General

  • Target

    50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd

  • Size

    1.1MB

  • Sample

    201106-qa1mkxr2ce

  • MD5

    d15f9783772ea30b93ea65e5ebc27895

  • SHA1

    e591de1936ef9bb12a7301628899013f408724ae

  • SHA256

    50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd

  • SHA512

    6edfa0814551f4253a319f0a48a1812f8b99662749cca4d0e2072a9bd23878853e0cc088b63566d4963f975ddf935a8b76e871d307e860a447e0dcd85eb359d4

Malware Config

Targets

    • Target

      50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd

    • Size

      1.1MB

    • MD5

      d15f9783772ea30b93ea65e5ebc27895

    • SHA1

      e591de1936ef9bb12a7301628899013f408724ae

    • SHA256

      50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd

    • SHA512

      6edfa0814551f4253a319f0a48a1812f8b99662749cca4d0e2072a9bd23878853e0cc088b63566d4963f975ddf935a8b76e871d307e860a447e0dcd85eb359d4

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks