General

  • Target

    251b0e105c9b6ccaa3cc0ceca46e682774252574958445114fbdc94b427a8c46

  • Size

    85KB

  • Sample

    210224-k3pwwxxh36

  • MD5

    cf7f23d2f869a9d0d153d4eff2a71302

  • SHA1

    1b41527468ce56429308eb8531dea8b9b068334a

  • SHA256

    251b0e105c9b6ccaa3cc0ceca46e682774252574958445114fbdc94b427a8c46

  • SHA512

    c267f55f246f17e3f59fc8931f947729eac15dcc7f0410eaf89c43cb1187ce0d5a8b76074883bd1c6f9b1b97476a54a597a1acd2e523dae8720de4fffd1b8b07

Malware Config

Extracted

Family

raccoon

Botnet

10c0109881f18ecf348e972501134667c0680a0c

Attributes
  • url4cnc

    https://telete.in/h_spon_1

rc4.plain
rc4.plain

Targets

    • Target

      251b0e105c9b6ccaa3cc0ceca46e682774252574958445114fbdc94b427a8c46

    • Size

      85KB

    • MD5

      cf7f23d2f869a9d0d153d4eff2a71302

    • SHA1

      1b41527468ce56429308eb8531dea8b9b068334a

    • SHA256

      251b0e105c9b6ccaa3cc0ceca46e682774252574958445114fbdc94b427a8c46

    • SHA512

      c267f55f246f17e3f59fc8931f947729eac15dcc7f0410eaf89c43cb1187ce0d5a8b76074883bd1c6f9b1b97476a54a597a1acd2e523dae8720de4fffd1b8b07

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks