General

  • Target

    Setup.exe

  • Size

    6.6MB

  • Sample

    230202-lycabsfg34

  • MD5

    9753def21127105443f13a1c76ccfcee

  • SHA1

    6a48f5595097f4d44668504aef0a3207d67c5c5c

  • SHA256

    19e18baac87a1805b385449ef3f945609b6e1c4a9cfd912765a3c1934637cbfb

  • SHA512

    bd187c6f703632bfded6ec45ed62564d10a97812111026103832fee599f92629fc2fa1650cb17a73eb945a86058cc8a0091c765cb70861f4a6033500098d49fe

  • SSDEEP

    196608:POLaJJiSb4tlUVHQf6bSU5EuklXBAuFiti:POOJMXUVHQg7kj

Malware Config

Extracted

Family

raccoon

Botnet

4e27b39e9aaa6403f36702b4d66f5024

C2

http://94.142.138.10/

http://94.142.138.9/

rc4.plain

Targets

    • Target

      Setup.exe

    • Size

      6.6MB

    • MD5

      9753def21127105443f13a1c76ccfcee

    • SHA1

      6a48f5595097f4d44668504aef0a3207d67c5c5c

    • SHA256

      19e18baac87a1805b385449ef3f945609b6e1c4a9cfd912765a3c1934637cbfb

    • SHA512

      bd187c6f703632bfded6ec45ed62564d10a97812111026103832fee599f92629fc2fa1650cb17a73eb945a86058cc8a0091c765cb70861f4a6033500098d49fe

    • SSDEEP

      196608:POLaJJiSb4tlUVHQf6bSU5EuklXBAuFiti:POOJMXUVHQg7kj

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks