General

  • Target

    822734b7ddbe7c857f0949762da30a15cccc9c2b99b5df3236163d83b8edc568

  • Size

    12.7MB

  • Sample

    230404-kmka5adg89

  • MD5

    4689829de199e30f231b8bebb22bc0de

  • SHA1

    35a0266126b8c867ad83a1b03edd303ad8fc4644

  • SHA256

    822734b7ddbe7c857f0949762da30a15cccc9c2b99b5df3236163d83b8edc568

  • SHA512

    4284f318eb9b2ebf587e0d56123294d79d1701ee89fb6857423d280d6042ae4c4c27e2ea969e057468004624cb9a7bf3c8949b531c858b8cebcb1efff399b3c9

  • SSDEEP

    196608:cdcW2w+rqPYBqAK3eNeTJyPRjI3HT56IeHDTKlH1KYLQON408prLfk6CByloYeF:w8ID3eNsclyznNce40m/vypqB

Malware Config

Extracted

Family

raccoon

Botnet

13718a923845c0cdab8ce45c585b8d63

C2

http://45.15.156.143/

rc4.plain

Targets

    • Target

      822734b7ddbe7c857f0949762da30a15cccc9c2b99b5df3236163d83b8edc568

    • Size

      12.7MB

    • MD5

      4689829de199e30f231b8bebb22bc0de

    • SHA1

      35a0266126b8c867ad83a1b03edd303ad8fc4644

    • SHA256

      822734b7ddbe7c857f0949762da30a15cccc9c2b99b5df3236163d83b8edc568

    • SHA512

      4284f318eb9b2ebf587e0d56123294d79d1701ee89fb6857423d280d6042ae4c4c27e2ea969e057468004624cb9a7bf3c8949b531c858b8cebcb1efff399b3c9

    • SSDEEP

      196608:cdcW2w+rqPYBqAK3eNeTJyPRjI3HT56IeHDTKlH1KYLQON408prLfk6CByloYeF:w8ID3eNsclyznNce40m/vypqB

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks