General

  • Target

    5056d9c299317929d9f11be9f1858c9a.exe

  • Size

    576KB

  • Sample

    210531-3wa9lhydrj

  • MD5

    5056d9c299317929d9f11be9f1858c9a

  • SHA1

    5e206d93bcbc31a6b9a87a8966599690938b66e1

  • SHA256

    4b6b6d5e17ad6e15bbe3ea479b43761a8e1fe173cd755e6f72ea2f2ffdb1cdce

  • SHA512

    43d580bdb9434df9a362512e8ea4bf6569a8b4ca2d4773c78adefa02bf4e3df397f10e964088ef4bada97b590891ff1eba7cc9870ee8378800255bc3d0e299a9

Malware Config

Extracted

Family

raccoon

Botnet

a5cce470ad0d57aff9fa94b5ee2c0c1fc2d802af

Attributes
  • url4cnc

    https://tttttt.me/baudemars

rc4.plain
rc4.plain

Targets

    • Target

      5056d9c299317929d9f11be9f1858c9a.exe

    • Size

      576KB

    • MD5

      5056d9c299317929d9f11be9f1858c9a

    • SHA1

      5e206d93bcbc31a6b9a87a8966599690938b66e1

    • SHA256

      4b6b6d5e17ad6e15bbe3ea479b43761a8e1fe173cd755e6f72ea2f2ffdb1cdce

    • SHA512

      43d580bdb9434df9a362512e8ea4bf6569a8b4ca2d4773c78adefa02bf4e3df397f10e964088ef4bada97b590891ff1eba7cc9870ee8378800255bc3d0e299a9

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks