General
-
Target
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
Size
47KB
-
Sample
240308-fgwdzsfe83
-
MD5
f1e075f8cebe5aaca53ed7c158d81cbd
-
SHA1
11f80b386b8a04a4f82d065cefb634bb389e9dbd
-
SHA256
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
SHA512
12b1d894dd8fd2e9c595458a9b4b7098821a642fdc27c6044b84c8c26784ca161957a7b1f934a7253be9737af031bfa15f7436d0776126eec608131924cba192
-
SSDEEP
768:7w5fIJQ5UMuXyicwVI7b8kgUUL8L/aUW/seidZhPlqEFiRT:sVp5UMuXy9wowR8tR/lqeip
Static task
static1
Malware Config
Extracted
raccoon
-
user_agent
f
Extracted
raccoon
4ddee039c3c1cb01baf0736505e3e436
http://94.131.106.24:80
-
user_agent
MrBidenNeverKnow
Targets
-
-
Target
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
Size
47KB
-
MD5
f1e075f8cebe5aaca53ed7c158d81cbd
-
SHA1
11f80b386b8a04a4f82d065cefb634bb389e9dbd
-
SHA256
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
SHA512
12b1d894dd8fd2e9c595458a9b4b7098821a642fdc27c6044b84c8c26784ca161957a7b1f934a7253be9737af031bfa15f7436d0776126eec608131924cba192
-
SSDEEP
768:7w5fIJQ5UMuXyicwVI7b8kgUUL8L/aUW/seidZhPlqEFiRT:sVp5UMuXy9wowR8tR/lqeip
-
Glupteba payload
-
Raccoon Stealer V2 payload
-
Contacts a large (4793) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies boot configuration data using bcdedit
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1