General

  • Target

    67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

  • Size

    1012KB

  • Sample

    241123-3rynesyqfq

  • MD5

    7a346721a1641a389685b55d07e8eb92

  • SHA1

    1e5ba0e54f475a754dad3583e32055a5f1974c90

  • SHA256

    67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988

  • SHA512

    dbe0f2c02537b8f00f54a3bf2493ba036ab06f74c1bdae789a77c888f0e4534a8b7784ba01a7cc9eee0c1646243df54a6671a3aee09b82566311aaeb9c280482

  • SSDEEP

    12288:hxt6hRd3GUju9Al4QMe89d18EbVAXMJrQF0p4v9TH9yzsN2j33+RgshWtqU59d3y:hxQhf3DcA78DbVAXWQF0p2hNIeQqU5wd

Malware Config

Extracted

Family

oski

C2

scarsa.ac.ug

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

raccoon

Botnet

b76017a227a0d879dec7c76613918569d03892fb

Attributes
  • url4cnc

    http://telegka.top/brikitiki

    http://telegin.top/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Targets

    • Target

      67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988.exe

    • Size

      1012KB

    • MD5

      7a346721a1641a389685b55d07e8eb92

    • SHA1

      1e5ba0e54f475a754dad3583e32055a5f1974c90

    • SHA256

      67a0008d2f8433a6ed4d3af7daf87ab79e5eecb9a7b97e564e54fb8f4a417988

    • SHA512

      dbe0f2c02537b8f00f54a3bf2493ba036ab06f74c1bdae789a77c888f0e4534a8b7784ba01a7cc9eee0c1646243df54a6671a3aee09b82566311aaeb9c280482

    • SSDEEP

      12288:hxt6hRd3GUju9Al4QMe89d18EbVAXMJrQF0p4v9TH9yzsN2j33+RgshWtqU59d3y:hxQhf3DcA78DbVAXWQF0p2hNIeQqU5wd

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • Oski family

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks