General

  • Target

    52cda18863f566acc4b5eff7f8f636f0.exe

  • Size

    415KB

  • Sample

    210408-cbc3h87slx

  • MD5

    52cda18863f566acc4b5eff7f8f636f0

  • SHA1

    3a169820b24409c606e70e89474f838a0e33bd34

  • SHA256

    8dc88e24501dff5acf2683104b0313ae866e64d35afaab19ce7e366939b4cc84

  • SHA512

    ef06a310d7fc29c27e9ee66d93c47f09d30771064d9e342fd49bd30836438bb7796c4cca7717611b43002b82cb8bc0e3246ed7c4d6e170726381a8de2fb9f2e3

Malware Config

Extracted

Family

raccoon

Botnet

687fc54591ef8d5772fd4c6b129cadc26dbadf74

Attributes
  • url4cnc

    https://telete.in/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      52cda18863f566acc4b5eff7f8f636f0.exe

    • Size

      415KB

    • MD5

      52cda18863f566acc4b5eff7f8f636f0

    • SHA1

      3a169820b24409c606e70e89474f838a0e33bd34

    • SHA256

      8dc88e24501dff5acf2683104b0313ae866e64d35afaab19ce7e366939b4cc84

    • SHA512

      ef06a310d7fc29c27e9ee66d93c47f09d30771064d9e342fd49bd30836438bb7796c4cca7717611b43002b82cb8bc0e3246ed7c4d6e170726381a8de2fb9f2e3

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks