General

  • Target

    1fb3afe777f5c29faa4523ada76f579708e4177ad3b18c84891183c0288ac0aa

  • Size

    20.8MB

  • Sample

    220427-rxgfjshdb7

  • MD5

    97d32f85f7f0c3a67033bf439eb350ea

  • SHA1

    d9dbfbb97cd4c4c93b044f454d83afc26e361ecd

  • SHA256

    1fb3afe777f5c29faa4523ada76f579708e4177ad3b18c84891183c0288ac0aa

  • SHA512

    f3fd99ce43edcb8e2fd818e0e445a9a3a232ec900f6820ab025099f1836a7136aa7640d5db897ace23bcb3241e6f1fad7f71104c55c1b17ddecea4b3a212d87b

Malware Config

Extracted

Family

raccoon

Version

1.7.1-hotfix

Botnet

0422feff6c251ddfdca83125d9b8ae570db3b316

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      1fb3afe777f5c29faa4523ada76f579708e4177ad3b18c84891183c0288ac0aa

    • Size

      20.8MB

    • MD5

      97d32f85f7f0c3a67033bf439eb350ea

    • SHA1

      d9dbfbb97cd4c4c93b044f454d83afc26e361ecd

    • SHA256

      1fb3afe777f5c29faa4523ada76f579708e4177ad3b18c84891183c0288ac0aa

    • SHA512

      f3fd99ce43edcb8e2fd818e0e445a9a3a232ec900f6820ab025099f1836a7136aa7640d5db897ace23bcb3241e6f1fad7f71104c55c1b17ddecea4b3a212d87b

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks