General

  • Target

    ab444e67d59822e2db238c4eb8e99d04.exe

  • Size

    193KB

  • Sample

    211002-xc7pwsegen

  • MD5

    ab444e67d59822e2db238c4eb8e99d04

  • SHA1

    8acd24cb9543babc8e9c22f2aafd39e0430a4602

  • SHA256

    a60659139ff3a9e6a4a482e060e301c83a25a02227308f6f572d79cc95c63dce

  • SHA512

    fc2cd599f4ef10f0f5a1d0db8de316b07076ed8323abc2fd099a40cb97fec0a46f35d7bbb1513435738f1c6bca0fb21b6998ea7b0658124fca95262106c80e73

Malware Config

Extracted

Family

raccoon

Botnet

�u'h�Y�����&s҈���Kcc,d�6�1�>�-�

Attributes
  • url4cnc

    �cb{K^�WXP�۸��fB:O�٩٭w<n'�>�+�d�?�]�e?$g����k�J��6�:������$Q

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

mix02.10

C2

185.215.113.15:6043

Targets

    • Target

      ab444e67d59822e2db238c4eb8e99d04.exe

    • Size

      193KB

    • MD5

      ab444e67d59822e2db238c4eb8e99d04

    • SHA1

      8acd24cb9543babc8e9c22f2aafd39e0430a4602

    • SHA256

      a60659139ff3a9e6a4a482e060e301c83a25a02227308f6f572d79cc95c63dce

    • SHA512

      fc2cd599f4ef10f0f5a1d0db8de316b07076ed8323abc2fd099a40cb97fec0a46f35d7bbb1513435738f1c6bca0fb21b6998ea7b0658124fca95262106c80e73

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger

      suricata: ET MALWARE AutoHotkey Downloader Checkin via IPLogger

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)

      suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)

    • suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

      suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

    • suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M1

      suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M1

    • suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M2

      suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M2

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks