General

  • Target

    2201646914fb891e7b7a77c2e4ed94ce106c9626d036a42a071b6ba72b581c43

  • Size

    420KB

  • Sample

    210927-acnwfsfdg7

  • MD5

    193bfae10de3d6bef3e3dff3b41c3ddb

  • SHA1

    0ebaeff19cb1bf6d8cacca340b03b6e4e822425c

  • SHA256

    2201646914fb891e7b7a77c2e4ed94ce106c9626d036a42a071b6ba72b581c43

  • SHA512

    4990b494c12bbe9a4a6c50c33dd32e44a1e8e8c8290c4acc0f1ab674d3b6ae9be21db046e71f31f9483dc448db802122ddacd1be5832c0ad53dff16168587228

Malware Config

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      2201646914fb891e7b7a77c2e4ed94ce106c9626d036a42a071b6ba72b581c43

    • Size

      420KB

    • MD5

      193bfae10de3d6bef3e3dff3b41c3ddb

    • SHA1

      0ebaeff19cb1bf6d8cacca340b03b6e4e822425c

    • SHA256

      2201646914fb891e7b7a77c2e4ed94ce106c9626d036a42a071b6ba72b581c43

    • SHA512

      4990b494c12bbe9a4a6c50c33dd32e44a1e8e8c8290c4acc0f1ab674d3b6ae9be21db046e71f31f9483dc448db802122ddacd1be5832c0ad53dff16168587228

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks