General

  • Target

    16add217626ff23aed9e35d98358a3b67485f3ea1fef7b895c9c86dfe394127b

  • Size

    21.1MB

  • Sample

    220511-24xffscdc9

  • MD5

    d8d732922c11a5f9ae7abf4580ce58af

  • SHA1

    55f3b06b60c561a928d956bea991a4409eb50d8e

  • SHA256

    16add217626ff23aed9e35d98358a3b67485f3ea1fef7b895c9c86dfe394127b

  • SHA512

    2a58bef05f60c2cfc240be229a3b4abe8a1d01c3fa8361ca9ab9a58c343632efa44eccb8f9bd7657976e3d891bd52ad9f6972bd5e21897f8e153c9b3522d9e0e

Malware Config

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      16add217626ff23aed9e35d98358a3b67485f3ea1fef7b895c9c86dfe394127b

    • Size

      21.1MB

    • MD5

      d8d732922c11a5f9ae7abf4580ce58af

    • SHA1

      55f3b06b60c561a928d956bea991a4409eb50d8e

    • SHA256

      16add217626ff23aed9e35d98358a3b67485f3ea1fef7b895c9c86dfe394127b

    • SHA512

      2a58bef05f60c2cfc240be229a3b4abe8a1d01c3fa8361ca9ab9a58c343632efa44eccb8f9bd7657976e3d891bd52ad9f6972bd5e21897f8e153c9b3522d9e0e

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks