Resubmissions
04-06-2023 23:53
230604-3xcyxaef9x 10General
-
Target
Instalar StartIsBack v2.9.15.exe
-
Size
5.1MB
-
Sample
230604-3xcyxaef9x
-
MD5
4b78592320ad42db84604e50b891949b
-
SHA1
eb492a52459fba6bb81b14c4301506a334215e95
-
SHA256
8bbdd91e62f2ca2a3657dc4a693592b3b8af2ef60dbee59d1b611576d2927df8
-
SHA512
f14b95a1381cbd790f4f7f2d9f7d0126fd58cfac1b738cee307e9fdb361528598e0ecac04ea9c05836b1553e54243cf0c86191ea6a9ff3d42e2f6f5240a432fd
-
SSDEEP
98304:Lg56UdZ0nknHZWSmAlD59x3qeJMU8qGnItw3bHly/eOzg4Z/V5PhMkRIw8:055sknHxmcTxRu1qdw3rlyZVdmkU
Static task
static1
Behavioral task
behavioral1
Sample
Instalar StartIsBack v2.9.15.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
raccoon
1.7.2
62b047a6bc812b9c3749280cf611f2d251d3ab9f
-
url4cnc
https://telete.in/h_money_1
Targets
-
-
Target
Instalar StartIsBack v2.9.15.exe
-
Size
5.1MB
-
MD5
4b78592320ad42db84604e50b891949b
-
SHA1
eb492a52459fba6bb81b14c4301506a334215e95
-
SHA256
8bbdd91e62f2ca2a3657dc4a693592b3b8af2ef60dbee59d1b611576d2927df8
-
SHA512
f14b95a1381cbd790f4f7f2d9f7d0126fd58cfac1b738cee307e9fdb361528598e0ecac04ea9c05836b1553e54243cf0c86191ea6a9ff3d42e2f6f5240a432fd
-
SSDEEP
98304:Lg56UdZ0nknHZWSmAlD59x3qeJMU8qGnItw3bHly/eOzg4Z/V5PhMkRIw8:055sknHxmcTxRu1qdw3rlyZVdmkU
-
Raccoon Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies Installed Components in the registry
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
3Scheduled Task
1Defense Evasion
Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1