General

  • Target

    3a3b33f3c468bfc7b2759d9e7ecf793d.exe

  • Size

    16.9MB

  • Sample

    221012-rnz7asfbc7

  • MD5

    3a3b33f3c468bfc7b2759d9e7ecf793d

  • SHA1

    74552fc3a50344a814c1e48d832ee055abbe3f4c

  • SHA256

    984e7d941327d6764df705f36223d4f137eff73c2dfb6acc117f6326b41e0968

  • SHA512

    5d7ed325372289c8e5c93d35265dcecceaeaa2e429fd4f3ab866a5868a18c765c870c931d4cac2380fc8ba25d85241db4ca569f194a76df757fef89f42beaa9f

  • SSDEEP

    393216:z6tlPxMeW6cML02hze6fw0ZyHFZtFFvYts19VQIJgNx/srAAS:k3MeFtSbtFBYO1xUHJ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://31.42.177.216/hfile.bin

Extracted

Family

raccoon

Botnet

9b19cf60d9bdf65b8a2495aa965456c3

C2

http://188.93.233.101/

rc4.plain

Targets

    • Target

      3a3b33f3c468bfc7b2759d9e7ecf793d.exe

    • Size

      16.9MB

    • MD5

      3a3b33f3c468bfc7b2759d9e7ecf793d

    • SHA1

      74552fc3a50344a814c1e48d832ee055abbe3f4c

    • SHA256

      984e7d941327d6764df705f36223d4f137eff73c2dfb6acc117f6326b41e0968

    • SHA512

      5d7ed325372289c8e5c93d35265dcecceaeaa2e429fd4f3ab866a5868a18c765c870c931d4cac2380fc8ba25d85241db4ca569f194a76df757fef89f42beaa9f

    • SSDEEP

      393216:z6tlPxMeW6cML02hze6fw0ZyHFZtFFvYts19VQIJgNx/srAAS:k3MeFtSbtFBYO1xUHJ

    • Modifies Windows Defender notification settings

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Tasks