General

  • Target

    Setup.exe

  • Size

    6.4MB

  • Sample

    220801-q6y7aaghb4

  • MD5

    297568d447677bab5ea6cf58c9dc49d8

  • SHA1

    050fa924c8a42032ef257edc63438adf8ae82361

  • SHA256

    1dfaa24fbc923bfe3b111081253534bba01da16731a6a45809e940c1d9665559

  • SHA512

    9d6b0f414930b97708c996627c9e6a50a5719db62beab2c256e3b749bbd9f555e7480d64b5bf29e0c64bd585d3ca490f6b5b1556a1b42b94cdde9cb76f8d6587

Malware Config

Extracted

Family

raccoon

Botnet

8eb14caca01131f5f4ff62ef8a0fcab4

C2

http://77.75.230.46/

http://5.252.23.142/

rc4.plain

Targets

    • Target

      Setup.exe

    • Size

      6.4MB

    • MD5

      297568d447677bab5ea6cf58c9dc49d8

    • SHA1

      050fa924c8a42032ef257edc63438adf8ae82361

    • SHA256

      1dfaa24fbc923bfe3b111081253534bba01da16731a6a45809e940c1d9665559

    • SHA512

      9d6b0f414930b97708c996627c9e6a50a5719db62beab2c256e3b749bbd9f555e7480d64b5bf29e0c64bd585d3ca490f6b5b1556a1b42b94cdde9cb76f8d6587

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

2
T1005

Tasks