General

  • Target

    52bd35dbb0a393f952096a135fc0d8bddf2892977e72a547f604d53433addfb5

  • Size

    10.1MB

  • Sample

    220516-xqr7csffam

  • MD5

    889956cee776d41937c39e225d3e72b6

  • SHA1

    cc8d22b6c453deb2ac2826610cb001b3dd0e9771

  • SHA256

    52bd35dbb0a393f952096a135fc0d8bddf2892977e72a547f604d53433addfb5

  • SHA512

    2fde4df02392114a2e2676963d05d2a40c748710de7e30dad3deb1083fa1e991c85ae49520d679905ae21eaaed7f0458f38454ce04ea1d6544576f0ca3934de4

Malware Config

Extracted

Family

raccoon

Botnet

8fe810873f688849dc81def1a46e795c11d65cab

Attributes
  • url4cnc

    https://telete.in/jredmankun

rc4.plain
rc4.plain

Targets

    • Target

      52bd35dbb0a393f952096a135fc0d8bddf2892977e72a547f604d53433addfb5

    • Size

      10.1MB

    • MD5

      889956cee776d41937c39e225d3e72b6

    • SHA1

      cc8d22b6c453deb2ac2826610cb001b3dd0e9771

    • SHA256

      52bd35dbb0a393f952096a135fc0d8bddf2892977e72a547f604d53433addfb5

    • SHA512

      2fde4df02392114a2e2676963d05d2a40c748710de7e30dad3deb1083fa1e991c85ae49520d679905ae21eaaed7f0458f38454ce04ea1d6544576f0ca3934de4

    • Modifies Windows Defender Real-time Protection settings

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Hidden Files and Directories

1
T1158

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks