General

  • Size

    6MB

  • Sample

    220716-thc6padfel

  • MD5

    065a30af4b949ed07c5c1761c7426f79

  • SHA1

    a3c706e73d278d6124c70d8cd0392f6c47f2205f

  • SHA256

    a48ba6c3447ff9e85c9524ce4a90771735e5ca09c917b74fce272e5ba171e5a7

  • SHA512

    a8e4651728bbd94d28c35d2ff757b86d6e986d271a518f4dfdb60b97884f15431abcf2c3c78dd6d2193a9eeaf99564c92099736c85b9a183b153db2c43a1c31f

Malware Config

Extracted

Family

raccoon

Botnet

8f4e4706e9b4e3a904862901d32e2123

C2

http://45.8.145.243/

http://78.159.97.21/

rc4.plain

Targets

    • Target

      065a30af4b949ed07c5c1761c7426f79

    • Size

      6MB

    • MD5

      065a30af4b949ed07c5c1761c7426f79

    • SHA1

      a3c706e73d278d6124c70d8cd0392f6c47f2205f

    • SHA256

      a48ba6c3447ff9e85c9524ce4a90771735e5ca09c917b74fce272e5ba171e5a7

    • SHA512

      a8e4651728bbd94d28c35d2ff757b86d6e986d271a518f4dfdb60b97884f15431abcf2c3c78dd6d2193a9eeaf99564c92099736c85b9a183b153db2c43a1c31f

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Command and Control

    Credential Access

    Defense Evasion

      Execution

        Exfiltration

          Impact

            Initial Access

              Lateral Movement

                Persistence

                  Privilege Escalation