General

  • Target

    AimBot CSGO.exe

  • Size

    715.3MB

  • Sample

    211024-gakjksdbg9

  • MD5

    591cee38361554eddcd1c340d567c99a

  • SHA1

    d7845cd7d8b8f87f175897c20d4c87e2cd8dcc4b

  • SHA256

    94fa2ee292d865aa1d8338f813c12477f353ede8d5254a69017e3b7955b74328

  • SHA512

    4f3b8705b80b83a8d7cb76aeb2f063120885cfdd76c2096171abe6988552a81fe725f68048868dfb7a39e95631aedb98886d65e0d74351e72a2c26e3cea66eab

Malware Config

Extracted

Family

raccoon

rc4.plain

Extracted

Family

raccoon

Botnet

fa70ab2170931ba30ea54d8d4a578fc7e93b5f04

Attributes
  • url4cnc

    http://telegka.top/vertu4iy

    http://telegin.top/vertu4iy

    https://t.me/vertu4iy

rc4.plain
rc4.plain

Targets

    • Target

      AimBot CSGO.exe

    • Size

      715.3MB

    • MD5

      591cee38361554eddcd1c340d567c99a

    • SHA1

      d7845cd7d8b8f87f175897c20d4c87e2cd8dcc4b

    • SHA256

      94fa2ee292d865aa1d8338f813c12477f353ede8d5254a69017e3b7955b74328

    • SHA512

      4f3b8705b80b83a8d7cb76aeb2f063120885cfdd76c2096171abe6988552a81fe725f68048868dfb7a39e95631aedb98886d65e0d74351e72a2c26e3cea66eab

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT Payload

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Sets service image path in registry

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Tasks