General

  • Target

    usfive_20210809-095748

  • Size

    511KB

  • Sample

    210809-35bb7j7tne

  • MD5

    4be0cbe1709ca5653bcc77a22511dd46

  • SHA1

    c4492e5cfe705f705fb08bcb3dfe0b30af408d36

  • SHA256

    244d3624209d79d74194422cb15ca209f957088aa1ee87a7cffadd0d6d3dfbc1

  • SHA512

    b769a084d811065e8f14fced9b8f67d7b1b8b1d557381256f9321da694724cbe3bab9621899a8987ae2429f3a919f1f47c1336d031340d77056387ef0218a790

Malware Config

Extracted

Family

raccoon

Botnet

c58b0b3f1f90ad7552aaf8e84180b7580f397001

Attributes
  • url4cnc

    https://telete.in/h_electricryptors2

rc4.plain
rc4.plain

Targets

    • Target

      usfive_20210809-095748

    • Size

      511KB

    • MD5

      4be0cbe1709ca5653bcc77a22511dd46

    • SHA1

      c4492e5cfe705f705fb08bcb3dfe0b30af408d36

    • SHA256

      244d3624209d79d74194422cb15ca209f957088aa1ee87a7cffadd0d6d3dfbc1

    • SHA512

      b769a084d811065e8f14fced9b8f67d7b1b8b1d557381256f9321da694724cbe3bab9621899a8987ae2429f3a919f1f47c1336d031340d77056387ef0218a790

    • DarkVNC

      DarkVNC is a malicious version of the famous VNC software.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • DarkVNC Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks