General

  • Target

    racoon.zip

  • Size

    12MB

  • Sample

    230203-fa747seb9s

  • MD5

    bd09817d3b7c8cd4da75a129241d804c

  • SHA1

    36467232ab8182e019d6dcbff44c709efcdca066

  • SHA256

    c195423817e1d8e44acc60674ce93d201aa9e9b4545e09066cf60ca169a5056f

  • SHA512

    fb3a214bc3207cded13eb6cc7cfb95e136bc35fa279d8e59c85ba289478dc9bebcbd32dbd62a1dd354cf61e7dd4ad4a3b9fb5a6f58ac0507e74bcb83ea3adb8c

  • SSDEEP

    196608:5rs87MYbQ2K69kuTaTYNteSZKtN7JnJ47HnN3xntRnw91mYC7jBKKfT6I1ZN:HYh2K69krTYXernJmt3JtCiJzD

Malware Config

Extracted

Family

raccoon

Botnet

8eb14caca01131f5f4ff62ef8a0fcab4

C2

http://45.89.54.95/

http://45.89.54.25/

http://74.119.192.56/

http://146.19.170.153/

http://185.53.46.76/

http://5.182.39.34/

rc4.plain

Targets

    • Target

      racoon/36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.bin

    • Size

      394MB

    • MD5

      3b1cbceeeeb2afe955e3d9eb8aebfe2d

    • SHA1

      a184bb6d82236bd928707fe1a54f8aa30af025c7

    • SHA256

      36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527

    • SHA512

      4c0ae900b351e92c16aee7fa6480c1850a03d6911926ce60eda1df9e292b5f556782e7eb2fabfc6bb63ac7f88223eb7b7e38487efb65e70b376899c848b71b47

    • SSDEEP

      49152:WNEe0GkOi1F6eQ+ydT+jLdhYiGS29SVPNpLnZRVhYXj/2YROvymC0DLG:WNEezKfdBhs+PnVhYyYROvyym

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      racoon/5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.bin

    • Size

      395MB

    • MD5

      6e304cd6d12c0d31869ed6e45fff4633

    • SHA1

      a5bb3c851cbf05c88357074ea66e272f839d0537

    • SHA256

      5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648

    • SHA512

      8ba2a27800e5062ee96d1f3a6f1485584c6762276a2016d7f02c3f33201fd664c77f27d47ec3c8706eed6ba3661116c95aff1213d544f792f83640412b97a1f5

    • SSDEEP

      196608:8YUmSslap7QMHe5HhVrHI/dl/v9TtZJD05y:ldEdCzrHSbv9troy

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Target

      racoon/8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.bin

    • Size

      2MB

    • MD5

      2e6450058b2871bf5888d45d67a4758c

    • SHA1

      550fd5fc040b4218ced382e945620bc42572b5ff

    • SHA256

      8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a

    • SHA512

      9333341e5bb13d0584688dd25d24c50bbf78059b6ade4fbc1b1701c1c2f484582188bf6e99a7879d8e93a95296cf277477b63330355fcc0923b2e65ebd23be31

    • SSDEEP

      49152:SNlw9lnFTn7de6J503GljSdm1BG1KFwutMZMVVSkLZdP3Gl:S87Fr7oq26Ok1BwKF3nUkLZdP

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Persistence

                    Privilege Escalation

                      Tasks