General

  • Target

    2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4

  • Size

    487KB

  • Sample

    201111-c4es5l2pmn

  • MD5

    bad103e7901dab550613a7d89bf10c4f

  • SHA1

    4f34aebf03c1840ef604064deefc02a030501134

  • SHA256

    2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4

  • SHA512

    b2be0cd2cb292b532adecadc5ea1e873ba8f44e3f64acc599038872cde6a070b8d18866e774c6e8dae3b6661a41e87facd58a3943d31395032868ef23638e715

Malware Config

Targets

    • Target

      2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4

    • Size

      487KB

    • MD5

      bad103e7901dab550613a7d89bf10c4f

    • SHA1

      4f34aebf03c1840ef604064deefc02a030501134

    • SHA256

      2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4

    • SHA512

      b2be0cd2cb292b532adecadc5ea1e873ba8f44e3f64acc599038872cde6a070b8d18866e774c6e8dae3b6661a41e87facd58a3943d31395032868ef23638e715

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks