Resubmissions

07-02-2022 00:34

220207-aw81qsdce2 10

Analysis

  • max time kernel
    185s
  • max time network
    227s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    07-02-2022 00:34

General

  • Target

    6e7_2021-01-19_18-04.exe

  • Size

    509KB

  • MD5

    d4827f2bb4c0446d1bba5df00c2436b8

  • SHA1

    69db7a9dd71235671819472bf2d55bb3eeaf11ea

  • SHA256

    235e42b187151383ebb91cb85af8500f19e18906bf57917fcf9e0da7004c86ff

  • SHA512

    9c3429767a76dfcaeaf6bc1b032d71ddb04a6d7f2956eb390cde050e5965fc0e8d2affb3b31061307f76f68c9c0e90e7f3908a73081c044ff89de88ff92307a5

Malware Config

Extracted

Family

raccoon

Version

1.7.2

Botnet

c6a0bbe2ae5d9a25bd8b22a8b362127290c5e84a

Attributes
  • url4cnc

    https://telete.in/h_royal_1

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e7_2021-01-19_18-04.exe
    "C:\Users\Admin\AppData\Local\Temp\6e7_2021-01-19_18-04.exe"
    1⤵
      PID:3776
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3036
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:3476

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3776-130-0x00000000049B0000-0x0000000004A15000-memory.dmp

      Filesize

      404KB

    • memory/3776-131-0x0000000004820000-0x00000000048B2000-memory.dmp

      Filesize

      584KB

    • memory/3776-132-0x0000000000400000-0x0000000004634000-memory.dmp

      Filesize

      66.2MB