General

  • Target

    59b1a1f58b7ca014b73a2eebda7eae53

  • Size

    1.2MB

  • Sample

    240113-3jz7aagabm

  • MD5

    59b1a1f58b7ca014b73a2eebda7eae53

  • SHA1

    553c47a56200b6d957e0ce1ea126399831012c5d

  • SHA256

    e8e31ad00eb7d6e4124e0d9dcd2a2e4ca20afa68007c0e655ae8cc5ca4bfdad9

  • SHA512

    8eb261de8b0396535f2f25d620e504961b79c252769634afe65aa1aff70792a91d183036ace376c8b1030186f270886c853458667f89296b5995887478072db0

  • SSDEEP

    24576:baHmapSp81RMg7gOuBg5p4nhr37H+9nTSkGHCf:barSy1RMsgOuC7yzCtO5C

Malware Config

Extracted

Family

raccoon

Botnet

c81fb6015c832710f869f6911e1aec18747e0184

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

gordonhk.ac.ug

Targets

    • Target

      59b1a1f58b7ca014b73a2eebda7eae53

    • Size

      1.2MB

    • MD5

      59b1a1f58b7ca014b73a2eebda7eae53

    • SHA1

      553c47a56200b6d957e0ce1ea126399831012c5d

    • SHA256

      e8e31ad00eb7d6e4124e0d9dcd2a2e4ca20afa68007c0e655ae8cc5ca4bfdad9

    • SHA512

      8eb261de8b0396535f2f25d620e504961b79c252769634afe65aa1aff70792a91d183036ace376c8b1030186f270886c853458667f89296b5995887478072db0

    • SSDEEP

      24576:baHmapSp81RMg7gOuBg5p4nhr37H+9nTSkGHCf:barSy1RMsgOuC7yzCtO5C

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Detect ZGRat V1

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks