General

  • Target

    22556e32f2ab3ac40ce2c5ce4d4198ede989b1ebd8674faead4d370bf9236029

  • Size

    29.2MB

  • Sample

    220417-r2xckabad9

  • MD5

    5a878b9b2088c63c9b22de5ec3d58b69

  • SHA1

    c23ec8e2ccbf7167fcc5ed2daafa2d7d5a2b4d02

  • SHA256

    22556e32f2ab3ac40ce2c5ce4d4198ede989b1ebd8674faead4d370bf9236029

  • SHA512

    17809b4771b90e417449264955b27660e5fe33f0749f111b68cf276734eaece087579b6242dcc564f66c01fb0a482b3e25856cf7a89f071fa2924b5c0c29bf53

Malware Config

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      22556e32f2ab3ac40ce2c5ce4d4198ede989b1ebd8674faead4d370bf9236029

    • Size

      29.2MB

    • MD5

      5a878b9b2088c63c9b22de5ec3d58b69

    • SHA1

      c23ec8e2ccbf7167fcc5ed2daafa2d7d5a2b4d02

    • SHA256

      22556e32f2ab3ac40ce2c5ce4d4198ede989b1ebd8674faead4d370bf9236029

    • SHA512

      17809b4771b90e417449264955b27660e5fe33f0749f111b68cf276734eaece087579b6242dcc564f66c01fb0a482b3e25856cf7a89f071fa2924b5c0c29bf53

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Tasks