General

  • Target

    Sildur's+Basic+Shaders+v2.1+Fancy.zip

  • Size

    25KB

  • Sample

    230406-ycbswseg67

  • MD5

    de1b9a96624dac863e7a0b01763fd72e

  • SHA1

    0d3f34ae261ae15764c6813684ffad9f5c1ceafe

  • SHA256

    8919b73e0d0a7c363c93c09a3fe20bed93b8d5f8020e2d30681685d201c4257a

  • SHA512

    d3e86bd4e2019f61305995ae8ee14e19814a628c8a0fe7eaffe52a02cb80498d3c849339804a5c4dec72f5f33021b8d26650fe960efe54ef989e5d5a7a47d618

  • SSDEEP

    384:VD8JPyIv6xbOdj6YGjUCxw9sDSU3Sc5XaE+no7uB0Cm5J28CNBC:VDmPyIv64sYGjU4w9sD/SjBoq85J2PHC

Malware Config

Extracted

Family

raccoon

Botnet

717609e6131226f92ce8ce08c34305be

C2

http://37.220.87.66/

xor.plain

Targets

    • Target

      Sildur's+Basic+Shaders+v2.1+Fancy.zip

    • Size

      25KB

    • MD5

      de1b9a96624dac863e7a0b01763fd72e

    • SHA1

      0d3f34ae261ae15764c6813684ffad9f5c1ceafe

    • SHA256

      8919b73e0d0a7c363c93c09a3fe20bed93b8d5f8020e2d30681685d201c4257a

    • SHA512

      d3e86bd4e2019f61305995ae8ee14e19814a628c8a0fe7eaffe52a02cb80498d3c849339804a5c4dec72f5f33021b8d26650fe960efe54ef989e5d5a7a47d618

    • SSDEEP

      384:VD8JPyIv6xbOdj6YGjUCxw9sDSU3Sc5XaE+no7uB0Cm5J28CNBC:VDmPyIv64sYGjU4w9sD/SjBoq85J2PHC

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

3
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

6
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

2
T1005

Tasks