General

  • Target

    5babc5b5da7f48bee3ab4bb22dee5864.exe

  • Size

    430KB

  • Sample

    210926-mtzeqsefh3

  • MD5

    5babc5b5da7f48bee3ab4bb22dee5864

  • SHA1

    5cffa0c9f2778d6096ec8cb214d481126f2ef765

  • SHA256

    9087412ce39a9f4988bb6d7e50018d3f1154e29f4edfc9d4f1d7b87609402bc0

  • SHA512

    8c93557ac5a32c0ff75c33be1d7034ff083d7b3f9a7011089ac83d1a059da29cf34a5a0adba89d44d654a0f2cd6aec7eaabe3378209e53fff235845050e24749

Malware Config

Extracted

Family

raccoon

Botnet

f6d7183c9e82d2a9b81e6c0608450aa66cefb51f

Attributes
  • url4cnc

    https://t.me/justoprostohello

rc4.plain
rc4.plain

Targets

    • Target

      5babc5b5da7f48bee3ab4bb22dee5864.exe

    • Size

      430KB

    • MD5

      5babc5b5da7f48bee3ab4bb22dee5864

    • SHA1

      5cffa0c9f2778d6096ec8cb214d481126f2ef765

    • SHA256

      9087412ce39a9f4988bb6d7e50018d3f1154e29f4edfc9d4f1d7b87609402bc0

    • SHA512

      8c93557ac5a32c0ff75c33be1d7034ff083d7b3f9a7011089ac83d1a059da29cf34a5a0adba89d44d654a0f2cd6aec7eaabe3378209e53fff235845050e24749

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks