General

  • Target

    nеwрhоtоshор.zip

  • Size

    7.4MB

  • Sample

    230302-n5rdyacg66

  • MD5

    80c3969f709804728399d605da6d8e31

  • SHA1

    5820fc1e989176141dff98d5d66b941ddd2cd76a

  • SHA256

    f873781a793346eb06f9682631872f29911c1b0e7154ed7cc736828218edac68

  • SHA512

    303cf052a8abc79aa6e339c52e4de048e79a5dc75eafabfbc51ed1cf8444e8825fb1bc68701097c4258537793803eebf3afca206869a727c6e4c294a8015c744

  • SSDEEP

    196608:/ZjZlcG0K/sb0V4eiEcce66uYJrOS2qBb4X++fEh1Z:/ZlqG0wyKriH5JSChlr

Malware Config

Extracted

Family

raccoon

Botnet

8fb7b851641d456f39570978e99f780e

C2

http://45.15.156.239/

rc4.plain

Targets

    • Target

      nеwрhоtоshор.exe

    • Size

      727.0MB

    • MD5

      f60b37f7828656a7a146ab4af83b9859

    • SHA1

      17e27e3e18fa195829a67d3fbc46c8ea9aebc817

    • SHA256

      14cf407d1989d77a558c7fc4fb62c981ee4c13a73f6c5e20c6194f3e6d1053dd

    • SHA512

      06ddfe93f23ccb6e3acbe99cc743ba660245a7fb87887c78a1eb4f124964e8db70be3d8d8ee9dd8e2c57dcef52846c06dc62bb5641369440b8576c6960722ada

    • SSDEEP

      196608:DkBkoGNu/6bIN6aEIqGCG2EuhdheNKAcqvWt:oGoOuESxEFzhdOKFqvWt

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks