General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbHdod19KM19RdlhSS3U0RnJZMGNCU18xMWc5d3xBQ3Jtc0tueWlORk9tU1VjSjQ3NExzTnpoSlNyTVN6enB2dkxQYVlGNkpNc1F3NVN0ajJnQ0o3cFJ0WjItVXJ0Zk1XWXR5YmVaSkpURUhXWGxrRG9CNjR2RThNX1d4MTJzNExtU013andnb2NJT05vWndrajdFOA&q=https%3A%2F%2Ftelegra.ph%2Ffv20-03-15&v=TVWVz7W7UjE

  • Sample

    230327-m8kvwsdb87

Malware Config

Extracted

Family

raccoon

Botnet

f26f614d4c0bc2bcd6601785661fb5cf

C2

http://45.9.74.170

http://77.73.134.43

rc4.plain

Targets

    • Target

      https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbHdod19KM19RdlhSS3U0RnJZMGNCU18xMWc5d3xBQ3Jtc0tueWlORk9tU1VjSjQ3NExzTnpoSlNyTVN6enB2dkxQYVlGNkpNc1F3NVN0ajJnQ0o3cFJ0WjItVXJ0Zk1XWXR5YmVaSkpURUhXWGxrRG9CNjR2RThNX1d4MTJzNExtU013andnb2NJT05vWndrajdFOA&q=https%3A%2F%2Ftelegra.ph%2Ffv20-03-15&v=TVWVz7W7UjE

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks