General
-
Target
https://securemail.oasisonthemount.org/
-
Sample
220314-tcpbrsbdaq
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
raccoon
Botnet
02d269f7fd9c44eb97a447f61af8619369370c0e
Attributes
-
url4cnc
http://194.180.191.185/g_shock_casio_easy
http://185.163.204.48/g_shock_casio_easy
https://t.me/g_shock_casio_easy
rc4.plain
rc4.plain
Targets
-
-
Target
https://securemail.oasisonthemount.org/
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-