General

  • Target

    929b4dbb9140752a54349be0f03562bc55baef8ebfb89b3ad3473a1d3293bc64

  • Size

    26.2MB

  • Sample

    220427-rjwnbacfel

  • MD5

    ecfc75cc9d669c8f711435eec0528863

  • SHA1

    dba66bf4b41d5c252b9a21b00ea7cb14673f02ca

  • SHA256

    929b4dbb9140752a54349be0f03562bc55baef8ebfb89b3ad3473a1d3293bc64

  • SHA512

    eb5271764979d6f64f4c68fe3ec07b960b11848485284206f798f201d5492c595b732de839fa6cde7429357bdfd139e875f6fcd05b9dea18ad3293549be789fd

Malware Config

Extracted

Family

raccoon

Version

1.7.1-hotfix

Botnet

0422feff6c251ddfdca83125d9b8ae570db3b316

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      929b4dbb9140752a54349be0f03562bc55baef8ebfb89b3ad3473a1d3293bc64

    • Size

      26.2MB

    • MD5

      ecfc75cc9d669c8f711435eec0528863

    • SHA1

      dba66bf4b41d5c252b9a21b00ea7cb14673f02ca

    • SHA256

      929b4dbb9140752a54349be0f03562bc55baef8ebfb89b3ad3473a1d3293bc64

    • SHA512

      eb5271764979d6f64f4c68fe3ec07b960b11848485284206f798f201d5492c595b732de839fa6cde7429357bdfd139e875f6fcd05b9dea18ad3293549be789fd

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks