General

  • Target

    9fbb8a90e9b971800f4bdb85e1bf8f7c

  • Size

    1.0MB

  • Sample

    231219-zzad1sccer

  • MD5

    9fbb8a90e9b971800f4bdb85e1bf8f7c

  • SHA1

    cf116f3df69bbb896f34f24d26c4573b14af2fe5

  • SHA256

    b6afb4c2d094c9e803015e65043ee6a48bbf0e31bdd66963078ca1454195b1c6

  • SHA512

    437907045e9a5af27db8a60db05780e72e60b58cc4949723d3f4b2b0d372aee13ed18335dec3ba33e32ae583046a9ef200eaf40df991746adf480bfda07be9f7

  • SSDEEP

    24576:IlE2q8MnAWRpnwU9QtTJaur6Syt4VhkFha1OIgImZk3xk5npFhkF96x5hkFYelP:2EeKTqtN7r7VV0VIm0yRpF0I0N

Malware Config

Extracted

Family

oski

C2

milsom.ug

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

raccoon

Version

1.8.1

Botnet

e16d9c3413a8d3bc552d87560e5a14148908608d

Attributes
  • url4cnc

    https://t.me/brikitiki

rc4.plain
rc4.plain

Targets

    • Target

      9fbb8a90e9b971800f4bdb85e1bf8f7c

    • Size

      1.0MB

    • MD5

      9fbb8a90e9b971800f4bdb85e1bf8f7c

    • SHA1

      cf116f3df69bbb896f34f24d26c4573b14af2fe5

    • SHA256

      b6afb4c2d094c9e803015e65043ee6a48bbf0e31bdd66963078ca1454195b1c6

    • SHA512

      437907045e9a5af27db8a60db05780e72e60b58cc4949723d3f4b2b0d372aee13ed18335dec3ba33e32ae583046a9ef200eaf40df991746adf480bfda07be9f7

    • SSDEEP

      24576:IlE2q8MnAWRpnwU9QtTJaur6Syt4VhkFha1OIgImZk3xk5npFhkF96x5hkFYelP:2EeKTqtN7r7VV0VIm0yRpF0I0N

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks