General

  • Target

    6654274FD3AED9024394EF8657461B9D.exe

  • Size

    7.4MB

  • Sample

    210620-y5yt39axs2

  • MD5

    6654274fd3aed9024394ef8657461b9d

  • SHA1

    cc3941cbc1baac94c8e91d07756ee37ab4b7b9fa

  • SHA256

    130aab0a401cfce6e038d6d9f2bf1d94588a92c04c9b27a67f7a00c6a1413491

  • SHA512

    f783c4cef5077b89b3e384415695e8c6adda4edf3f15b0fede37b93cf156d0021cb381a52425d3110549ce915e614925eba5c28d7e47c30e2bbe673a9f35a5a6

Malware Config

Targets

    • Target

      6654274FD3AED9024394EF8657461B9D.exe

    • Size

      7.4MB

    • MD5

      6654274fd3aed9024394ef8657461b9d

    • SHA1

      cc3941cbc1baac94c8e91d07756ee37ab4b7b9fa

    • SHA256

      130aab0a401cfce6e038d6d9f2bf1d94588a92c04c9b27a67f7a00c6a1413491

    • SHA512

      f783c4cef5077b89b3e384415695e8c6adda4edf3f15b0fede37b93cf156d0021cb381a52425d3110549ce915e614925eba5c28d7e47c30e2bbe673a9f35a5a6

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks