General

  • Target

    731f4b7012c0ad58e9c56c4b1b554c912ec925b7a9bf7d5df3e6bbc99bd0c6dc

  • Size

    1.8MB

  • Sample

    211117-rbmqfacha4

  • MD5

    0f0b18a626f02ffb2f27b7cf015bca33

  • SHA1

    6cc29c04a546ad9ecb280be0d17adf1f9677ab38

  • SHA256

    731f4b7012c0ad58e9c56c4b1b554c912ec925b7a9bf7d5df3e6bbc99bd0c6dc

  • SHA512

    4021f7a55fadc0acbc53b43eb74e57192af438f3feb7bb0c5ed41fb20bd8e5b73b5e14f48cf1036f9adcf12c1258e4fa0e60704dac07ab91be8da10c3f3af266

Malware Config

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

fe1f102f3334068962b64125bcb00816dba46087

Attributes
  • url4cnc

    http://91.219.236.27/ocherednyara1

    http://5.181.156.92/ocherednyara1

    http://91.219.236.207/ocherednyara1

    http://185.225.19.18/ocherednyara1

    http://91.219.237.227/ocherednyara1

    https://t.me/ocherednyara1

rc4.plain
rc4.plain

Targets

    • Target

      731f4b7012c0ad58e9c56c4b1b554c912ec925b7a9bf7d5df3e6bbc99bd0c6dc

    • Size

      1.8MB

    • MD5

      0f0b18a626f02ffb2f27b7cf015bca33

    • SHA1

      6cc29c04a546ad9ecb280be0d17adf1f9677ab38

    • SHA256

      731f4b7012c0ad58e9c56c4b1b554c912ec925b7a9bf7d5df3e6bbc99bd0c6dc

    • SHA512

      4021f7a55fadc0acbc53b43eb74e57192af438f3feb7bb0c5ed41fb20bd8e5b73b5e14f48cf1036f9adcf12c1258e4fa0e60704dac07ab91be8da10c3f3af266

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks