General

  • Target

    Tutorial_1080pFHR.mp4

  • Size

    7.5MB

  • Sample

    230321-z7rm9sfb7y

  • MD5

    095d552cbcd7b88ae751d8aeee300a43

  • SHA1

    158ff63c89a1f25fa67d216242f11c7938eb22c1

  • SHA256

    d03d2dbc94ae073b65a829872155db619ccfee90322799181d37ab671e66914a

  • SHA512

    13f9834e88c83d966b3e5e5b395f17c9248c58ee35d59be1b5c45deedf0fded1f5d859c6435dc40773347f5c887c42dba2c4b0e4f35994ae566f4ecb89f45e28

  • SSDEEP

    196608:vK0EChCax3d+0IMnibwl+DaRATR36emWKexXei:v5EChB/y6ib9uRABjP5n

Malware Config

Extracted

Family

raccoon

Botnet

f49765d62e02586d0fe162b5d3a934ad

C2

http://78.153.130.123/

http://212.113.119.35/

http://212.113.119.48/

http://212.113.106.218/

rc4.plain

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      Tutorial_1080pFHR.mp4

    • Size

      7.5MB

    • MD5

      095d552cbcd7b88ae751d8aeee300a43

    • SHA1

      158ff63c89a1f25fa67d216242f11c7938eb22c1

    • SHA256

      d03d2dbc94ae073b65a829872155db619ccfee90322799181d37ab671e66914a

    • SHA512

      13f9834e88c83d966b3e5e5b395f17c9248c58ee35d59be1b5c45deedf0fded1f5d859c6435dc40773347f5c887c42dba2c4b0e4f35994ae566f4ecb89f45e28

    • SSDEEP

      196608:vK0EChCax3d+0IMnibwl+DaRATR36emWKexXei:v5EChB/y6ib9uRABjP5n

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

5
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

2
T1005

Tasks