General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware2.22480.18960

  • Size

    409KB

  • Sample

    210408-73qte8w9ce

  • MD5

    5fe98645af299f9560e0054ceaba54c3

  • SHA1

    acce5b8ed572ba37bf99e264657ee1073e26b478

  • SHA256

    2b4ca2c55ee1aebc8f963c87da8f160c31641bfd75808ad75273239b10dd793a

  • SHA512

    ee6ebef83fa32f1020b6943df686cb270ec565d7e8f8dd521d55b2b1d4dd3742d22bbb6a0010e0deab0329b90331ad340ad9ff09efd17bf9a72715742419dc3e

Malware Config

Extracted

Family

raccoon

Botnet

687fc54591ef8d5772fd4c6b129cadc26dbadf74

Attributes
  • url4cnc

    https://telete.in/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      SecuriteInfo.com.W32.AIDetect.malware2.22480.18960

    • Size

      409KB

    • MD5

      5fe98645af299f9560e0054ceaba54c3

    • SHA1

      acce5b8ed572ba37bf99e264657ee1073e26b478

    • SHA256

      2b4ca2c55ee1aebc8f963c87da8f160c31641bfd75808ad75273239b10dd793a

    • SHA512

      ee6ebef83fa32f1020b6943df686cb270ec565d7e8f8dd521d55b2b1d4dd3742d22bbb6a0010e0deab0329b90331ad340ad9ff09efd17bf9a72715742419dc3e

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks