General

  • Target

    1473faa523f68f98a636592c0a04dcdf5d597ad86824ed52ffdc439da07a00f2

  • Size

    27.3MB

  • Sample

    220419-c8kvsageaq

  • MD5

    d971f4f3784359c6e7dfc46f4dae1262

  • SHA1

    b07b2952de25d8cf3ff60ac140f85855890a2b83

  • SHA256

    1473faa523f68f98a636592c0a04dcdf5d597ad86824ed52ffdc439da07a00f2

  • SHA512

    047da592abd06221405815c1bb912fc894efaa36539d932559b0f25b4520236d29232b960161e4d6d1c424d15aaaf936dbc689df63a6148bf48039563b64bb6f

Malware Config

Extracted

Family

raccoon

Version

1.7.1-hotfix

Botnet

0422feff6c251ddfdca83125d9b8ae570db3b316

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      1473faa523f68f98a636592c0a04dcdf5d597ad86824ed52ffdc439da07a00f2

    • Size

      27.3MB

    • MD5

      d971f4f3784359c6e7dfc46f4dae1262

    • SHA1

      b07b2952de25d8cf3ff60ac140f85855890a2b83

    • SHA256

      1473faa523f68f98a636592c0a04dcdf5d597ad86824ed52ffdc439da07a00f2

    • SHA512

      047da592abd06221405815c1bb912fc894efaa36539d932559b0f25b4520236d29232b960161e4d6d1c424d15aaaf936dbc689df63a6148bf48039563b64bb6f

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks