General

  • Target

    NEAS.b5cf579375a0f70bb78e1db6b286517906614d1aeedada230f88e22126c08d4fexe.exe

  • Size

    17.2MB

  • Sample

    231204-t6ygjach3s

  • MD5

    925b24e015594a31f27b664408d5790b

  • SHA1

    34da1ed812040a8537e35fa985bb5a391170df24

  • SHA256

    b5cf579375a0f70bb78e1db6b286517906614d1aeedada230f88e22126c08d4f

  • SHA512

    a54d03cc68002635fb1fdd12853777993563cb145a4315fc32c0e66f920b7f43e9030f8b8aedb64199b6872d9bc778f2e13fca7d59d764fbff8a8aef6b4c4f7c

  • SSDEEP

    393216:5/dAyQ3aVYQ3wjvRj4tKEP3VgDePlbYfOPtYu:VdAj3aOvRXSlgDePlEfOlYu

Malware Config

Targets

    • Target

      NEAS.b5cf579375a0f70bb78e1db6b286517906614d1aeedada230f88e22126c08d4fexe.exe

    • Size

      17.2MB

    • MD5

      925b24e015594a31f27b664408d5790b

    • SHA1

      34da1ed812040a8537e35fa985bb5a391170df24

    • SHA256

      b5cf579375a0f70bb78e1db6b286517906614d1aeedada230f88e22126c08d4f

    • SHA512

      a54d03cc68002635fb1fdd12853777993563cb145a4315fc32c0e66f920b7f43e9030f8b8aedb64199b6872d9bc778f2e13fca7d59d764fbff8a8aef6b4c4f7c

    • SSDEEP

      393216:5/dAyQ3aVYQ3wjvRj4tKEP3VgDePlbYfOPtYu:VdAj3aOvRXSlgDePlEfOlYu

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks