General

  • Target

    d3ea18248c18320851c27cdf789edd3a.exe

  • Size

    302KB

  • Sample

    220911-klez1sfbaj

  • MD5

    d3ea18248c18320851c27cdf789edd3a

  • SHA1

    0bd731a8fb20a478968470642dda202ff91a5090

  • SHA256

    c48968a646809b11a1ea796d3882bd6e3a1470bf124c1c25e86d27855d0df0a3

  • SHA512

    107658decb4d7afcd36405716bb942ecf2de1848a4b092d17ab450128b6021a88f1eb0341b28ff450e3b49b0d23f62881295b9db2c77ea85d09dee7017d17a72

  • SSDEEP

    6144:bG8R/5tbNAJIZMV3wH7A46zTuq5JB38K7t0PklaMVJVN6LM9D:b9lA4gTuq5738ZPkl9VNn

Malware Config

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Extracted

Family

raccoon

Botnet

1adeb438cd8ab2abb4349e0ca6853b53

C2

http://94.131.106.225

http://188.119.112.93/

http://94.131.106.224

rc4.plain

Targets

    • Target

      d3ea18248c18320851c27cdf789edd3a.exe

    • Size

      302KB

    • MD5

      d3ea18248c18320851c27cdf789edd3a

    • SHA1

      0bd731a8fb20a478968470642dda202ff91a5090

    • SHA256

      c48968a646809b11a1ea796d3882bd6e3a1470bf124c1c25e86d27855d0df0a3

    • SHA512

      107658decb4d7afcd36405716bb942ecf2de1848a4b092d17ab450128b6021a88f1eb0341b28ff450e3b49b0d23f62881295b9db2c77ea85d09dee7017d17a72

    • SSDEEP

      6144:bG8R/5tbNAJIZMV3wH7A46zTuq5JB38K7t0PklaMVJVN6LM9D:b9lA4gTuq5738ZPkl9VNn

    • Detects Smokeloader packer

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks