General

  • Target

    Expert-PC-2023.exe

  • Size

    730.9MB

  • Sample

    230418-rsefdsdg4y

  • MD5

    1cc87e637e55a2e6a88c745855423045

  • SHA1

    7e837f0a6854e6f0b68f417bb8f5f8dc2daeee23

  • SHA256

    6148a04932be8b508c730fae9b7a8b67d96bd5bd21801a047e34a8e819a55c62

  • SHA512

    c23bce8c05365d9e626f2b6d49e3d74608c55a31977eaa01981962f105abed5a3c30ebd18a3a0c5c8bdb29c9746227ce063a093964edf367262bfab27bfd2827

  • SSDEEP

    196608:UUJOFXQovEaJV73j5m9iepb+EDGVV3hCKboTEWMw6FO5+3Z4KW:UEfovJ13jk9Xp+VVRJbdwRiDW

Malware Config

Extracted

Family

raccoon

Botnet

9429a6d92284fd6d41daa221d04032be

C2

http://212.113.119.153/

http://77.91.84.147/

http://212.113.119.35/

http://79.137.248.245/

xor.plain

Extracted

Family

laplas

C2

http://212.113.106.172

Attributes
  • api_key

    a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298

Targets

    • Target

      Expert-PC-2023.exe

    • Size

      730.9MB

    • MD5

      1cc87e637e55a2e6a88c745855423045

    • SHA1

      7e837f0a6854e6f0b68f417bb8f5f8dc2daeee23

    • SHA256

      6148a04932be8b508c730fae9b7a8b67d96bd5bd21801a047e34a8e819a55c62

    • SHA512

      c23bce8c05365d9e626f2b6d49e3d74608c55a31977eaa01981962f105abed5a3c30ebd18a3a0c5c8bdb29c9746227ce063a093964edf367262bfab27bfd2827

    • SSDEEP

      196608:UUJOFXQovEaJV73j5m9iepb+EDGVV3hCKboTEWMw6FO5+3Z4KW:UEfovJ13jk9Xp+VVRJbdwRiDW

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks