General

  • Target

    ccd5ab291113bf69fcbccee8ab889c9cf5a0d0240feed43b73785497ace3c467.exe

  • Size

    4.1MB

  • Sample

    210903-grz1lacef7

  • MD5

    f0d14517fdc249bdd8f3bd53f8d9c341

  • SHA1

    b64c49054f5c98211c6c44f48acc33f14eeb9838

  • SHA256

    ccd5ab291113bf69fcbccee8ab889c9cf5a0d0240feed43b73785497ace3c467

  • SHA512

    8f7f6114523426fb3c1040ccc2e56b38ffd1341c5e1356e6f44eda9afbf877c76946dffc46a4a8fac71eb02ba67a6212f07627903b810858c6a95ed94e0f4f96

Malware Config

Extracted

Family

raccoon

Botnet

43aae292cfe6f58a13bd7111bdd7d5ded5b23ec3

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

oski

C2

mazooyaar.ac.ug

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      ccd5ab291113bf69fcbccee8ab889c9cf5a0d0240feed43b73785497ace3c467.exe

    • Size

      4.1MB

    • MD5

      f0d14517fdc249bdd8f3bd53f8d9c341

    • SHA1

      b64c49054f5c98211c6c44f48acc33f14eeb9838

    • SHA256

      ccd5ab291113bf69fcbccee8ab889c9cf5a0d0240feed43b73785497ace3c467

    • SHA512

      8f7f6114523426fb3c1040ccc2e56b38ffd1341c5e1356e6f44eda9afbf877c76946dffc46a4a8fac71eb02ba67a6212f07627903b810858c6a95ed94e0f4f96

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks