General

  • Target

    2O23-F1LES-S0ft.rar

  • Size

    55.5MB

  • Sample

    230416-ae9wpshh2x

  • MD5

    afd485565c39afa23eb8593213c28e3e

  • SHA1

    1261d257122f6dd909159f605d545c134d740335

  • SHA256

    739d8d55c2406ee0fdceace4d009449d72e5d6708da277ed7cbf6c9593b09283

  • SHA512

    2a70857b4174228f9c7dad21f3fce4a411a3d0e21b8813318bb0adb29dbc5bcc44521a694a9100f4c2630db3f5de2cfbb379ab9b27093fa954525b5f50c974a0

  • SSDEEP

    1572864:Fry1MyLoRWm17mA+qcznUqavELeeTIINbv1KPOe:tLJW8mAxcwXvELMkbvYPOe

Malware Config

Extracted

Family

raccoon

Botnet

c827bbf17c1606fd383054eceed28695

C2

http://95.216.153.86/

http://5.75.159.229/

http://212.113.119.153/

http://78.153.130.123/

xor.plain

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      2O23-F1LES-S0ft.rar

    • Size

      55.5MB

    • MD5

      afd485565c39afa23eb8593213c28e3e

    • SHA1

      1261d257122f6dd909159f605d545c134d740335

    • SHA256

      739d8d55c2406ee0fdceace4d009449d72e5d6708da277ed7cbf6c9593b09283

    • SHA512

      2a70857b4174228f9c7dad21f3fce4a411a3d0e21b8813318bb0adb29dbc5bcc44521a694a9100f4c2630db3f5de2cfbb379ab9b27093fa954525b5f50c974a0

    • SSDEEP

      1572864:Fry1MyLoRWm17mA+qcznUqavELeeTIINbv1KPOe:tLJW8mAxcwXvELMkbvYPOe

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks