SOCRadar® Cyber Intelligence Inc. | New Version of Raccoon Stealer Released
Home

Resources

Blog
Haz 29, 2022
9 Mins Read

New Version of Raccoon Stealer Released

The new version of Raccoon Stealer has been released. The first version was first seen in 2019 and served as MaaS (malware-as-a-service.) The malware ceased operations on March 25, following the death of one of its key developers in the Russia-Ukraine war.

The new version of Raccoon Stealer has been reintroduced with an announcement on the Telegram channel. Claiming in the announcement that the new version is “much faster and more convenient,” the threat actors stated that the malware is “fully automated” and that operations can be carried out “with just a few mouse clicks.”

The new version of Raccoon Stealer has been announced on the Telegram channel.
The new version of Raccoon Stealer has been announced on the Telegram channel. You can click here for the translation of the full text. 

What Features Are In The New Version Of Raccoon Stealer?

According to the threat actors’ statement, Raccoon Stealer is now a malware with both loader and stealer functions and focuses on cryptocurrency wallets.

All the features are:

  • Lists installed applications and identify those using credentials: browsers, crypto wallets, emails, etc.
  • Steals passwords, cookies, and credit cards from identified applications.
  • Targets desktop cryptocurrency wallets and wallet extensions like Electrum, Electrum-LTC, Ethereum, MeraMask Wallet, ElectronCash, Atomic, Jaxx, Binance, and TronLink.
  • Stores the stolen data in RAM for later sending to the threat actor’s command and control center.
  • Runs on both 32-bit and 64-bit operating systems.
  • Extracts files from all disks, install executables (cmd, dll, exe), emulates, and downloads other executables.
  • Captures screenshots and records keystrokes.
  • Exploits fingerprint systems using Windows Registry and WinApi functions.

How is it Working?

According to Sekoia’s analysis, the new version of Raccoon Stealer is written in C/C++ using WinApi. The malware can download legitimate third-party DLL files from the C2 server. The configuration of C2 servers and string expressions goes through RC4 encryption and Base64 encoding.

An example attack scenario for the new version of Racoon Stealer is as follows:

  • Loads DLL files dynamically.
  • Establishes a run-time dynamic connection with WinApi functions.
  • Performs Base64 decoding and RC4 decryption of string data.
  • Performs deobfuscation for C2 servers.
  • Performs mutex and user authorization checks.
  • Performs fingerprinting and data spoofing.
  • Retrieves configuration settings from the C2 server.
  • Downloads malware and installs legitimate third-party DLL files.
  • Collects information such as CPU, RAM, OS version, screenshot, system information, browsers, and crypto-wallets from the infected device.
  • Sends the collected information to the C2 server.
  • Cleans files created by the malware.

The data collected by Racoon Stealer is sent to the C2 server in a file via a POST request as a new request for each new data. Security researchers have determined that the malware does not use defense evasion techniques such as anti-analysis and obfuscation.

An example file including stolen data
An example file including stolen data

Network Communication

Raccoon Stealer uses a Tor-based C2 server to perform data extortion. Each executable of the malware is linked to client-specific signatures.

The malware sends a POST request to the C2 server containing the machine ID, username, and configuration ID. The server responds with the malware configuration:

  • Application to target
  • URLs containing legitimate third-party DLLs
  • Tokens used for data extraction
  • File grabber configuration
Raccoon Stealer v2 communications
Raccoon Stealer v2 communications

After examining the samples of the new version of Raccoon Stealer, cyber security researchers revealed that although many changes have been made to the malware, the main working logic has not changed much.

Considering the unfinished coding and functions such as analysis interruption compared to the first version, Raccoon Stealer is expected to be upgraded regularly in the future.

MITRE ATT&CK TTPs

Tactic

Technique

Description

Defense Evasion

T1140 – Deobfuscate/Decode Files or Information

Decodes strings and the C2 configuration in the malware using RC4 and base64.

Defense Evasion

T1027 – Obfuscated Files or Information

Uses RC4-encrypted strings. 

Credential Access

T1539 – Steal Web Session Cookie

Harvests cookies from popular browsers.

Credential Access

T1555.003 – Credentials from Password Stores: Credentials from Web Browsers

Collects passwords from popular browsers.

Discovery

T1083 – File and Directory Discovery

Lists files and directories to grab files through all disks.

Discovery

T1057 – Process Discovery

Lists the currently running processes on the system.

Discovery

T1012 – Query Registry

Queries the Windows Registry key at HKLMSOFTWAREMicrosoftCryptographyMachineGuid to retrieve the MachineGuid value.

Discovery

T1518 – Software Discovery

Lists all installed software for the infected machine, by querying the Windows Registry key at HKLMSOFTWAREMicrosoftWindowsCurrentVersionuninstall

Discovery

T1082 – System Information Discovery

Collects OS version, host architecture, CPU information, RAM capacity and display device information.

Discovery

T1614 – System Time Discovery

Collects the time zone information from the system.

Collection

T1119 – Automated Collection

Scans the disks and automatically collects files.

Collection

T1005 – Data from Local System

Collects credentials of cryptocurrency wallets from the local system.

Collection

T1113 – Screen Capture

Captures a screenshot of the victim’s desktop.

Command and Control

T1071.001 – Application Layer Protocol: Web Protocols

Uses HTTP for C2 communications.

Command and Control

T1041 – Exfiltration Over C2 Channel

Exfiltrates data over the C2 channel.

Command and Control

T1105 – Ingress Tool Transfer

Downloads legitimate third-party DLLs for data collection onto compromised hosts.

Execution

T1106 – Native API

Has the ability to launch files using ShellExecuteW.

Defense Evasion

T1055.001 – Process Injection: Dynamic-link Library Injection

Has the ability to load DLLs via LoadLibraryW and GetProcAddress.

Defense Evasion

T1407 – Download New Code at Runtime

Downloads its next stage from a remote host.

Raccoon Stealer IoCs

SHA256 (Raccoon Stealer v2)

  • 03a8531989aeeec1befecbba4f3ee218309306224bd22b7e52104537e32bacd6
  • 056a3022c5e70d112e82844d1101e1a591b02960ae0609f06e9930a3f3bd6efa
  • 084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0
  • 0adc96946d9806969375212cfd5012f93cb205c1008b935f6886ba0ffe7fe262
  • 0bc3aa6b692b3873dfdd6942fb0eaba7aab391f1d154df80be1193aa792df0c2
  • 0fb5b0562e81ae2a89f61b25cca023adf7f370fe049508c96c6bcf898a63e4d7
  • 20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161
  • 2c7563c76c710a3988c14b8246fd8864c37c08b723b0a24e0f4aa876cc5f73c8
  • 40daa898f98206806ad3ff78f63409d509922e0c482684cf4f180faac8cac273
  • 494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d
  • 502f0a6587cf2d084e98f5edc12192e1ca37515bdf7364511415d615be2e6aa7
  • 516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e
  • 567bd8dd69485d8f79edad514e54c085af1490dcc5461a01ee79e57e138b9b10
  • 59d74f7e172a2ee14e5e43b9704ac95428b28741f1dbadbf5c9279dd37a11f86
  • 61d8e542a34f41b5675daf924a6c21322f0a6aaad9a888b23357c85d29a8f87a
  • 6697604c88f0fbb05a6848915d1800eb9a77b607e834c6a01e2bf4a076955a91
  • 672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009
  • 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0
  • 6e5d7b8bc69145a2b65b4be1a2d66a8dbc579e54c09660c4070c5667192864bf
  • 6e7e69cd1c9b24f6a36870ec5ae6c31c69022fb48d3fdf59bcda5c1528bc9c04
  • 6f4e7b117124a1b5a27dfd9a7a3e03b46e84000a992e1029f0cfb62bb77fc3f3
  • 7503d528db92b909ad05d65379e6aae008dfaa3664bcac252d34d7a9f25b2db9
  • 7c09a54191495c699c04be9e0e2d97cf91d9c4346a37ad751416a2db52636de2
  • 83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7
  • 9014f5d4a597cdec4ec2d10bf73883b4f0106f62c9938a8c6a59e506b1203e2b
  • 909875959dd07c5aeb345d5f93e662329866e862eb8bb18d0727aa4d9c72e6eb
  • 99834c9981535b584040fef84af159e5e584927aac4a6a57001ba5ecf1e869c4
  • 9d66a6a6823aea1b923f0c200dfecb1ae70839d955e11a3f85184b8e0b16c6f8
  • 9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47
  • a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698
  • a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330
  • ab3d8c58a33fd90eca17dc079eb05469bbe535b16eb653810f134df888e230ce
  • ae46253a19c9e846c405b3926655efead40d8f873fef008f896019f34d486dfe
  • b7104e1420fbcdd4a78b02069f32d4882d38203dcb5f73509b60cc1567dac437
  • c6f111e1b32229232af8af25d714ef8f77e30bbc122c0600076bb42cbe46e22b
  • c7ee80a9387a941d13738ab069f8f055e14ea8bdb12403a81e0166b098fce032
  • cddc1e15fcfcb29cfcb3631f1d478640d228fd9ea38c01d347833567970d04e3
  • ce29b09c57bdd0df33b7d45abe0047952fc009dbc1b5b43351aa6dad751ba262
  • d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3
  • e2b87b9ea8bb2bf835cb064845ff863253f3eedb4a88122598eee52c9579b203
  • f051b93953919cbf673b16ba995a3c1aa58e59dcc256b9eaf1cdd2f6b3c7dfd2
  • f6d5c0f3f6c5cd498b605e06c6bf49a66c7cbbedf3480cb3a95229b4dc91e81d
  • F97835279804b62e667211706cce813179e2571634880770862a5f759fa17c11

For other IoCs, please check sekoia.io Community GitHub.

IoCs (May 2021)

SHA256

  • 012e382049b88808e2d0b26e016dc189f608deea9b6cc993ce24a57c99dd93d1
  • 18c27b85f26566dd782171e00ea5b5872546b23526cca0ebb185caca35fdec93
  • 24499fbfd8a2b2663899841f3cf424b60d60c26351b5d491fd475adf9e301256
  • 3c5120a6e894b64924dc44f3cdc0da65f277b32870f73019cefeacf492663c0e
  • 40175d0027919244b6b56fe5276c44aba846d532501e562da37831403c9ed44e
  • 624b7ae8befcf91dbf768d9703147ac8f9bd46b08ffe14a75c77e88736bf07d0
  • 75c3a83073d9b15d4f47308b5d688f1ec07422419e3bd54e78f6ef8683d42e5c
  • 8815b21c44c22aec31f7fa6e69dcb83a60c572f8365ff02b5c6f12154e01a4c2
  • 97e95e99fd499ec45a7c1d8683d5731ce5e7a8fb8b710622e578cd169a00d8d9
  • a2420c7f0c7bf5d3c0893aff6b7440a09c0531632434d2bbb6f8ed98b04317b9
  • bfb37c9adc809e880f56dd10898b5425242330d6e2fa69e014a98e6dc18ce416
  • caf3eca514de58e215b5e9f568f748293be64a3c82e15c2f905903cd9bfacc1c
  • de7ccff53ca27db1ed1e3e0d0df07f2e3364ec6b7e60622dc7726cba56831eb7

Domains

telete[.]in 

telecut[.]in 

tgraph[.]io 

tttttt[.]me 

telegram[.]cat

telegram[.]services 

tlgr[.]org 

xn--r1a[.]click (т[.]click) 

xn--r1a[.]link (т[.]link) 

xn--r1a[.]live(т[.]live) 

xn--r1a[.]site (т[.]site) 

xn--r1a[.]website (т[.]website) 

IP Addresses

195.201.225[.]248 

95.216.186[.]40 

URLs

hxxps://telete[.]in/jiocacossa

hxxps://tttttt[.]me/kokajakprozak

hxxps://tttttt[.]me/antitantief3

hxxps://telete[.]in/baudemars

hxxps://telete[.]in/bpa1010100102

hxxps://tttttt[.]me/brikitiki

hxxps://tttttt[.]me/ch0koalpengold