General

  • Target

    82f7734fef8ee0789cf270f292651cbe.exe

  • Size

    4.5MB

  • Sample

    210928-hemp6sahfm

  • MD5

    82f7734fef8ee0789cf270f292651cbe

  • SHA1

    80db9b3c72f88b3cacb40362ee21baa2390de38c

  • SHA256

    9d8f04bd64b81ed3367def9f74a8a98e9a868f30db9433a9ef37b481394c9046

  • SHA512

    a493e4d5c3f6d617366fecdf981427544dfe083cd3859fb5b8972b9fc5aa9aa5ca33ddf45d7dfbe1c1887797228fc1b17a2f0a03ca59bc000b1931f02135263e

Malware Config

Extracted

Family

raccoon

Botnet

c1728bc068ff13c9172ac566c717a997b9a7b1dc

Attributes
  • url4cnc

    https://t.me/tika31ramencomp

rc4.plain
rc4.plain

Targets

    • Target

      82f7734fef8ee0789cf270f292651cbe.exe

    • Size

      4.5MB

    • MD5

      82f7734fef8ee0789cf270f292651cbe

    • SHA1

      80db9b3c72f88b3cacb40362ee21baa2390de38c

    • SHA256

      9d8f04bd64b81ed3367def9f74a8a98e9a868f30db9433a9ef37b481394c9046

    • SHA512

      a493e4d5c3f6d617366fecdf981427544dfe083cd3859fb5b8972b9fc5aa9aa5ca33ddf45d7dfbe1c1887797228fc1b17a2f0a03ca59bc000b1931f02135263e

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

      suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks