General

  • Target

    35ffc986d369b7ebda2e69d37cfac6b8.exe

  • Size

    2.6MB

  • Sample

    220805-wcavgsffb8

  • MD5

    35ffc986d369b7ebda2e69d37cfac6b8

  • SHA1

    fe80513205e9176a156f2e00ea9762baa6131a0f

  • SHA256

    5b037a43064259317c81f5f4192fc8b54cd218d3d9772201ec52b0680453ceb4

  • SHA512

    fed41f9b20cf370f93507663bf583f762d61fda3df1908aed4238992fe1f15822f8a783c802e9789f8b10aaa4d128831365c6866d1abea46044093a927622640

Malware Config

Extracted

Family

raccoon

Botnet

95a5f22777e49d40d70bf77aadccdc5c

C2

http://193.43.147.6/

rc4.plain

Targets

    • Target

      35ffc986d369b7ebda2e69d37cfac6b8.exe

    • Size

      2.6MB

    • MD5

      35ffc986d369b7ebda2e69d37cfac6b8

    • SHA1

      fe80513205e9176a156f2e00ea9762baa6131a0f

    • SHA256

      5b037a43064259317c81f5f4192fc8b54cd218d3d9772201ec52b0680453ceb4

    • SHA512

      fed41f9b20cf370f93507663bf583f762d61fda3df1908aed4238992fe1f15822f8a783c802e9789f8b10aaa4d128831365c6866d1abea46044093a927622640

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks