Resubmissions

05-07-2023 16:26

230705-txjl1seb27 10

05-07-2023 16:22

230705-tve6taea75 8

General

  • Target

    ha

  • Size

    1KB

  • Sample

    230705-txjl1seb27

  • MD5

    06ca3e390508247636f74cd86ea93aab

  • SHA1

    905651c0cde39b1cba9b97aaac8a0afd7b3de65f

  • SHA256

    d8f2312a7d0e9b9e1c946f5dda8e540df1351ab7f1199d14ef1aaae6b10d30b9

  • SHA512

    a7193b7aaf4508c5f0390eea8a55f85a9b8f31bb8c0e64fc21f0160877e4c5d3a230220d5f60ab663c092d78e980c19847378ee5df4ed604ecff88e8d38f3627

Malware Config

Extracted

Family

raccoon

Botnet

f6e5c7e97f2505d86193a7ac640393f0

C2

http://217.79.243.147:80/

xor.plain

Targets

    • Target

      ha

    • Size

      1KB

    • MD5

      06ca3e390508247636f74cd86ea93aab

    • SHA1

      905651c0cde39b1cba9b97aaac8a0afd7b3de65f

    • SHA256

      d8f2312a7d0e9b9e1c946f5dda8e540df1351ab7f1199d14ef1aaae6b10d30b9

    • SHA512

      a7193b7aaf4508c5f0390eea8a55f85a9b8f31bb8c0e64fc21f0160877e4c5d3a230220d5f60ab663c092d78e980c19847378ee5df4ed604ecff88e8d38f3627

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks