General

  • Target

    PA$$w0rds_1234__SetuperFree5--G7.rar

  • Size

    6.1MB

  • Sample

    220928-p5krtshaaq

  • MD5

    5a904d6c9710c2cabfc8f23c288578de

  • SHA1

    9666219cab7e99767b23058a4dcd1c81b8bb45ac

  • SHA256

    586f0c058e263138e6f147a0d13e9cef92b8e099da004b096cb8629a0b8bceac

  • SHA512

    cd8951190f6c51229c70321af2c8085afe2558d2068b922cf35a86f232c03f8937d0f8b9cd20413067cc43f8c99a5a50fbfe6693f0d9deaf5f9d39196d725033

  • SSDEEP

    196608:hoPf1PN8TYTOfJ4ALyPzAv9Nsn0KiQYNA:hQtPN886fJGsDs9j

Malware Config

Extracted

Family

raccoon

Botnet

0dcbeb99ec1adc5c2b2b94dc1e3fd2c4

C2

http://94.131.107.132/

rc4.plain

Targets

    • Target

      Setup 2.exe

    • Size

      726.3MB

    • MD5

      7b7f4c7bc7fe71ab3564b69a5e4c2a36

    • SHA1

      ecab2d3e3173beb712e0792ac747d30b65b72644

    • SHA256

      29912bee2ce5c51fabc43c5701dba06a44cb9cd2f591c099a9d53f69b6b7791e

    • SHA512

      645137903a35437c9f9ca2d1c0b9e832334d058ab69a6327590db73c611f148ec8c2ba9d910e0a4ed4e960f0b59a29064a40794cc21fa6bb0797f183217390be

    • SSDEEP

      98304:TDyBA2avWjy6U+ZbARvvGM/uCxDphFb/4I9xxTapkS9haR6IN9T9QfMrve9lS:tMyzWevz/fpbbprDRtveHS

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks