General

  • Target

    VTDown.zip

  • Size

    12.2MB

  • Sample

    230201-g89alacb78

  • MD5

    1fe3ee0d5ce23cd513072e5485f8da95

  • SHA1

    10ea989fe8d6d87826e36ac677b70dabec62c050

  • SHA256

    21b7aaaf26ee918a87177864dab46f27a3f1262d048b7f09723cc9daabf1966f

  • SHA512

    928d5cc2985562111eac09ec9435bbbe2170b2d1c26c1db1c4df4c5a144947db9173ac1a14386ed67f3a40a80b654086e2b3de9070747ce7ffdbb6ea7a4b824b

  • SSDEEP

    196608:9rs87MYbQ2K6dkuTaTYNteSZKtN7JnJ47HnN3xntRnw91m/C7jBKKfT6I1Z0:7Yh2K6dkrTYXernJmt3JtCDJzy

Malware Config

Extracted

Family

raccoon

Botnet

8eb14caca01131f5f4ff62ef8a0fcab4

C2

http://45.89.54.95/

http://45.89.54.25/

http://74.119.192.56/

http://146.19.170.153/

http://185.53.46.76/

http://5.182.39.34/

rc4.plain

Targets

    • Target

      36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.bin

    • Size

      394.7MB

    • MD5

      3b1cbceeeeb2afe955e3d9eb8aebfe2d

    • SHA1

      a184bb6d82236bd928707fe1a54f8aa30af025c7

    • SHA256

      36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527

    • SHA512

      4c0ae900b351e92c16aee7fa6480c1850a03d6911926ce60eda1df9e292b5f556782e7eb2fabfc6bb63ac7f88223eb7b7e38487efb65e70b376899c848b71b47

    • SSDEEP

      49152:WNEe0GkOi1F6eQ+ydT+jLdhYiGS29SVPNpLnZRVhYXj/2YROvymC0DLG:WNEezKfdBhs+PnVhYyYROvyym

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.bin

    • Size

      395.1MB

    • MD5

      6e304cd6d12c0d31869ed6e45fff4633

    • SHA1

      a5bb3c851cbf05c88357074ea66e272f839d0537

    • SHA256

      5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648

    • SHA512

      8ba2a27800e5062ee96d1f3a6f1485584c6762276a2016d7f02c3f33201fd664c77f27d47ec3c8706eed6ba3661116c95aff1213d544f792f83640412b97a1f5

    • SSDEEP

      196608:8YUmSslap7QMHe5HhVrHI/dl/v9TtZJD05y:ldEdCzrHSbv9troy

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Target

      8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.bin

    • Size

      2.2MB

    • MD5

      2e6450058b2871bf5888d45d67a4758c

    • SHA1

      550fd5fc040b4218ced382e945620bc42572b5ff

    • SHA256

      8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a

    • SHA512

      9333341e5bb13d0584688dd25d24c50bbf78059b6ade4fbc1b1701c1c2f484582188bf6e99a7879d8e93a95296cf277477b63330355fcc0923b2e65ebd23be31

    • SSDEEP

      49152:SNlw9lnFTn7de6J503GljSdm1BG1KFwutMZMVVSkLZdP3Gl:S87Fr7oq26Ok1BwKF3nUkLZdP

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Tasks