General

  • Target

    896A458CB385900B5F9397D053840F8E.fil

  • Size

    1.8MB

  • Sample

    220802-zpjjyaceam

  • MD5

    896a458cb385900b5f9397d053840f8e

  • SHA1

    9f6133903475848da6fe6d2696e0ec88d8707faa

  • SHA256

    6ba8a17c779c8c5ddbe8c51d1a79bf7fde1fad96b8a9c743447300f1ca177c6d

  • SHA512

    5936080d5741db3587e3553cead91b49b5faf8479ae217067fe4b2cfa9649405f7612d36237f72c6ba2ef7998882ec3427b2680b63410596e918ef390a2a77c9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://hyperhyper8.com/welcome

Extracted

Family

raccoon

Botnet

c4376f037b1703b305ca5fb81f6ffc21

C2

http://74.119.192.73/

http://77.75.230.84/

rc4.plain

Targets

    • Target

      896A458CB385900B5F9397D053840F8E.fil

    • Size

      1.8MB

    • MD5

      896a458cb385900b5f9397d053840f8e

    • SHA1

      9f6133903475848da6fe6d2696e0ec88d8707faa

    • SHA256

      6ba8a17c779c8c5ddbe8c51d1a79bf7fde1fad96b8a9c743447300f1ca177c6d

    • SHA512

      5936080d5741db3587e3553cead91b49b5faf8479ae217067fe4b2cfa9649405f7612d36237f72c6ba2ef7998882ec3427b2680b63410596e918ef390a2a77c9

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks