General

  • Target

    1dfdc5940eceee2c157af18d3f89960186cbf21f4fac2506ec4e152cc09df1ac

  • Size

    26.1MB

  • Sample

    220511-3ajg6scfd8

  • MD5

    0d90fb3791d8c81d57ba520d3cd50589

  • SHA1

    2c758280791ec4ab5449c02fec4cdb59485faee4

  • SHA256

    1dfdc5940eceee2c157af18d3f89960186cbf21f4fac2506ec4e152cc09df1ac

  • SHA512

    09b36badc64a4415760b3deb4bea6121b0eb44905ecd6d4efe533989a1bac298deab72d46eba513c9b8a9abc77d628333b0bf1a8ce9391ff7acb26edbb650238

Malware Config

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      1dfdc5940eceee2c157af18d3f89960186cbf21f4fac2506ec4e152cc09df1ac

    • Size

      26.1MB

    • MD5

      0d90fb3791d8c81d57ba520d3cd50589

    • SHA1

      2c758280791ec4ab5449c02fec4cdb59485faee4

    • SHA256

      1dfdc5940eceee2c157af18d3f89960186cbf21f4fac2506ec4e152cc09df1ac

    • SHA512

      09b36badc64a4415760b3deb4bea6121b0eb44905ecd6d4efe533989a1bac298deab72d46eba513c9b8a9abc77d628333b0bf1a8ce9391ff7acb26edbb650238

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks