General

  • Target

    dec3cf3fb618a435846f123285aef58498af95552e12cb1f7285e5ba88a601f6

  • Size

    968KB

  • Sample

    220521-mmxmkafbfp

  • MD5

    3f3df6de2e1f11e5ff1c7a575b4bf8e7

  • SHA1

    0aac573c48073d4255ece6b40c6d1633fdd6765f

  • SHA256

    dec3cf3fb618a435846f123285aef58498af95552e12cb1f7285e5ba88a601f6

  • SHA512

    6b413ea94ccd978fd490e1108f5e3ef1f0269f7eb5685e9d22bbd9e72c58efa51ada8a921b2882f501e83fd670268bb4421f4321d03d2945c8c89133e7101192

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

raccoon

Botnet

e5a98a0423e8a05c07c85512b1c0eb7a8fff35a1

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

oski

C2

pabloq.ug

Targets

    • Target

      dec3cf3fb618a435846f123285aef58498af95552e12cb1f7285e5ba88a601f6

    • Size

      968KB

    • MD5

      3f3df6de2e1f11e5ff1c7a575b4bf8e7

    • SHA1

      0aac573c48073d4255ece6b40c6d1633fdd6765f

    • SHA256

      dec3cf3fb618a435846f123285aef58498af95552e12cb1f7285e5ba88a601f6

    • SHA512

      6b413ea94ccd978fd490e1108f5e3ef1f0269f7eb5685e9d22bbd9e72c58efa51ada8a921b2882f501e83fd670268bb4421f4321d03d2945c8c89133e7101192

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks