General

  • Target

    7e4c53136bc738fa1d362aa09f909dd573d00a4fa33e190d47b79e4c768d332d

  • Size

    495KB

  • Sample

    210930-xp91saadb6

  • MD5

    fdda2b470e297df8b220427e91c5541a

  • SHA1

    3276a229b244f8feb4079648701b496fe08ebcb0

  • SHA256

    7e4c53136bc738fa1d362aa09f909dd573d00a4fa33e190d47b79e4c768d332d

  • SHA512

    53eea558ca2876ac5e2b88fdb10760cbc0e28abc21ccfa35535171d2dc4a907ad69b8bdc4c41861abc2b7bf99e7d1f73c192967bcebeea7b5aa897a020f592b2

Malware Config

Extracted

Family

raccoon

Botnet

f6d7183c9e82d2a9b81e6c0608450aa66cefb51f

Attributes
  • url4cnc

    https://t.me/justoprostohello

rc4.plain
rc4.plain

Targets

    • Target

      7e4c53136bc738fa1d362aa09f909dd573d00a4fa33e190d47b79e4c768d332d

    • Size

      495KB

    • MD5

      fdda2b470e297df8b220427e91c5541a

    • SHA1

      3276a229b244f8feb4079648701b496fe08ebcb0

    • SHA256

      7e4c53136bc738fa1d362aa09f909dd573d00a4fa33e190d47b79e4c768d332d

    • SHA512

      53eea558ca2876ac5e2b88fdb10760cbc0e28abc21ccfa35535171d2dc4a907ad69b8bdc4c41861abc2b7bf99e7d1f73c192967bcebeea7b5aa897a020f592b2

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks