General

  • Target

    PC-File_Expert (1).rar

  • Size

    51.9MB

  • Sample

    230320-rcpanadg98

  • MD5

    dd18d20d5092bfaa84b966af8dba24cf

  • SHA1

    d2387f45af7151349a42c50af0b5217a7206688a

  • SHA256

    3309937a7fe86f6a41ea9038628ca92d46bd5aebcafd9b18df0c6bbdd4f3917a

  • SHA512

    b940c70f76a1ca710be06a6b1b8936c72078b990d861dee31d142a70541cfe19311edcb1630b0f8594a26bef6f5f7f0fcbbec5999e6a910de4d7824a51e8de73

  • SSDEEP

    1572864:5JWZ2Z244Thb8TF0Xi+KBDTNn0W/SulTz/N:5UZXdhgp0FKBPRr/SulTz1

Malware Config

Extracted

Family

raccoon

Botnet

f49765d62e02586d0fe162b5d3a934ad

C2

http://78.153.130.123/

http://212.113.119.35/

http://212.113.119.48/

http://212.113.106.218/

rc4.plain

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      PC-File_Expert (1).rar

    • Size

      51.9MB

    • MD5

      dd18d20d5092bfaa84b966af8dba24cf

    • SHA1

      d2387f45af7151349a42c50af0b5217a7206688a

    • SHA256

      3309937a7fe86f6a41ea9038628ca92d46bd5aebcafd9b18df0c6bbdd4f3917a

    • SHA512

      b940c70f76a1ca710be06a6b1b8936c72078b990d861dee31d142a70541cfe19311edcb1630b0f8594a26bef6f5f7f0fcbbec5999e6a910de4d7824a51e8de73

    • SSDEEP

      1572864:5JWZ2Z244Thb8TF0Xi+KBDTNn0W/SulTz/N:5UZXdhgp0FKBPRr/SulTz1

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks