decoded.avast.io
Open in
urlscan Pro
34.111.249.39
Public Scan
URL:
https://decoded.avast.io/vladimirmartyanov/raccoon-stealer-trash-panda-abuses-telegram/
Submission: On August 08 via api from US — Scanned from DE
Submission: On August 08 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://decoded.avast.io/
<form class="search-form" action="https://decoded.avast.io/" method="get">
<input name="s" type="text" value="" placeholder="Type here to search...">
<button type="submit">Search</button>
</form>
GET https://decoded.avast.io/
<form class="search-form" action="https://decoded.avast.io/" method="get">
<input name="s" type="text" value="" placeholder="Type here to search...">
<button type="submit">Search</button>
</form>
Text Content
* Mobile * Network * PC * IoT * Careers * Menu * Search * Menu RACCOON STEALER: “TRASH PANDA” ABUSES TELEGRAM by Vladimir MartyanovMarch 9, 20227 min read We recently came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses. Raccoon Stealer is a password stealer capable of stealing not just passwords, but various types of data, including: * Cookies, saved logins and forms data from browsers * Login credentials from email clients and messengers * Files from crypto wallets * Data from browser plugins and extension * Arbitrary files based on commands from C&C In addition, it’s able to download and execute arbitrary files by command from its C&C. In combination with active development and promotion on underground forums, Raccoon Stealer is prevalent and dangerous. The oldest samples of Raccoon Stealer we’ve seen have timestamps from the end of April 2019. Its authors have stated the same month as the start of selling the malware on underground forums. Since then, it has been updated many times. According to its authors, they fixed bugs, added features, and more. DISTRIBUTION We’ve seen Raccoon distributed via downloaders: Buer Loader and GCleaner. According to some samples, we believe it is also being distributed in the form of fake game cheats, patches for cracked software (including hacks and mods for Fortnite, Valorant, and NBA2K22), or other software. Taking into account that Raccoon Stealer is for sale, it’s distribution techniques are limited only by the imagination of the end buyers. Some samples are spread unpacked, while some are protected using Themida or malware packers. Worth noting is that some samples were packed more than five times in a row with the same packer! TECHNICAL DETAILS Raccoon Stealer is written in C/C++ and built using Visual Studio. Samples have a size of about 580-600 kB. The code quality is below average, some strings are encrypted, some are not. Once executed, Racoon Stealer starts checking for the default user locale set on the infected device and won’t work if it’s one of the following: * Russian * Ukrainian * Belarusian * Kazakh * Kyrgyz * Armenian * Tajik * Uzbek C&C COMMUNICATIONS The most interesting thing about this stealer is its communication with C&Cs. There are four values crucial for its C&C communication, which are hardcoded in every Raccoon Stealer sample: * MAIN_KEY. This value has been changed four times during the year. * URLs of Telegram gates with channel name. Gates are used not to implement a complicated Telegram protocol and not to store any credentials inside samples * BotID – hexadecimal string, sent to the C&C every time * TELEGRAM_KEY – a key to decrypt the C&C address obtained from Telegram Gate Let’s look at an example to see how it works: 447c03cc63a420c07875132d35ef027adec98e7bd446cf4f7c9d45b6af40ea2b unpacked to: f1cfcce14739887cc7c082d44316e955841e4559ba62415e1d2c9ed57d0c6232: 1. First of all, MAIN_KEY is decrypted. See the decryption code in the image below: In this example, the MAIN_KEY is jY1aN3zZ2j. This key is used to decrypt Telegram Gates URLs and BotID. 2. This example decodes and decrypts Telegram Gate URLs. It is stored in the sample as: Rf66cjXWSDBo1vlrnxFnlmWs5Hi29V1kU8o8g8VtcKby7dXlgh1EIweq4Q9e3PZJl3bZKVJok2GgpA90j35LVd34QAiXtpeV2UZQS5VrcO7UWo0E1JOzwI0Zqrdk9jzEGQIEzdvSl5HWSzlFRuIjBmOLmgH/V84PCRFevc40ZuTAZUq+q1JywL+G/1xzXQdYZiKWea8ODgaN+4B8cT3AqbHmY5+6MHEBWTqTsITPAxKdPMu3dC9nwdBF3nlvmX4/q/gSPflYF7aIU1wFhZxViWq2 After decoding Base64 it has this form: Decrypting this binary data with RC4 using MAIN_KEY gives us a string with Telegram Gates: 3. The stealer has to get it’s real C&C. To do so, it requests a Telegram Gate, which returns an HTML-page: Here you can see a Telegram channel name and its status in Base64: e74b2mD/ry6GYdwNuXl10SYoVBR7/tFgp2f-v32 The prefix (always five characters) and postfix (always six characters) are removed and it becomes mD/ry6GYdwNuXl10SYoVBR7/tFgp The Base64 is then decoded to obtain an encrypted C&C URL: The TELEGRAM_KEY in this sample is a string 739b4887457d3ffa7b811ce0d03315ce and the Raccoon uses it as a key to RC4 algorithm to finally decrypt the C&C URL: http://91.219.236[.]18/ 4. Raccoon makes a query string with PC information (machine GUID and user name), and BotID 5. Query string is encrypted with RC4 using a MAIN_KEY and then encoded with Base64. 6. This data is sent using POST to the C&C, and the response is encoded with Base64 and encrypted with the MAIN_KEY. Actually, it’s a JSON with a lot of parameters and it looks like this: Thus, the Telegram infrastructure is used to store and update actual C&C addresses. It looks quite convenient and reliable until Telegram decides to take action. ANALYSIS THE PEOPLE BEHIND RACCOON STEALER Based on our analysis of seller messages on underground forums, we can deduce some information about the people behind the malware. Raccoon Stealer was developed by a team, some (or maybe all) members of the team are Russian native speakers. Messages on the forum are written in Russian, and we assume they are from former USSR countries because they try to prevent the Stealer from targeting users in these countries. Possible names/nicknames of group members may be supposed based on the analysis of artifacts, found in samples: * C:\Users\a13xuiop1337\ * C:\Users\David\ PREVALENCE Raccoon Stealer is quite prevalent: from March 3, 2021 - February 17, 2022 our systems detected more than 25,000 Raccoon-related samples. We identified more than 1,300 distinct configs during that period. Here is a map, showing the number of systems Avast protected from Raccoon Stealer from March 3, 2021 - February 17, 2022. In this time frame, Avast protected nearly 600,000 Raccoon Stealer attacks. The country where we have blocked the most attempts is Russia, which is interesting because the actors behind the malware don’t want to infect computers in Russia or Central Asia. We believe the attacks spray and pray, distributing the malware around the world. It’s not until it makes it onto a system that it begins checking for the default locale. If it is one of the language listed above, it won’t run. This explains why we detected so many attack attempts in Russia, we block the malware before it can run, ie. before it can even get to the stage where it checks for the device’s locale. If an unprotected device that comes across the malware with its locale set to English or any other language that is not on the exception list but is in Russia, it would stiIl become infected. Screenshot with claims about not working with CIS TELEGRAM CHANNELS From the more than 1,300 distinct configs we extracted, 429 of them are unique Telegram channels. Some of them were used only in a single config, others were used dozens of times. The most used channels were: * jdiamond13 – 122 times * jjbadb0y – 44 times * nixsmasterbaks2 – 31 times * hellobyegain – 25 times * h_smurf1kman_1 – 24 times Thus, five of the most used channels were found in about 19% of configs. MALWARE DISTRIBUTED BY RACCOON As was previously mentioned, Raccoon Stealer is able to download and execute arbitrary files from a command from C&C. We managed to collect some of these files. We collected 185 files, with a total size 265 Mb, and some of the groups are: * Downloaders – used to download and execute other files * Clipboard crypto stealers – change crypto wallet addresses in the clipboard – very popular (more than 10%) * WhiteBlackCrypt Ransomware SERVERS USED TO DOWNLOAD THIS SOFTWARE We extracted unique links to other malware from Raccoon configs received from C&Cs, it was 196 unique URLs. Some analysis results: * 43% of URLs have HTTP scheme, 57% – HTTPS. * 83 domain names were used. * About 20% of malware were placed on Discord CDN * About 10% were served from aun3xk17k[.]space CONCLUSION We will continue to monitor Raccoon Stealer’s activity, keeping an eye on new C&Cs, Telegram channels, and downloaded samples. We predict it may be used wider by other cybercrime groups. We assume the group behind Raccoon Stealer will further develop new features, including new software to steal data from, for example, as well as bypass protection this software has in place. IOC 447c03cc63a420c07875132d35ef027adec98e7bd446cf4f7c9d45b6af40ea2b f1cfcce14739887cc7c082d44316e955841e4559ba62415e1d2c9ed57d0c6232 Tagged asmalware, Malware Analysis, Racoon, reversing, stealer, telegram, trash panda Share:XFacebook FURTHER READING PC DECRYPTED: DONEX RANSOMWARE AND ITS PREDECESSORS July 8, 2024by Threat Research Team Researchers from Avast have discovered a flaw in the cryptographic schema of the DoNex ransomware and its predecessors. In cooperation with law enforcement organizations, we have been silently providing the decryptor to DoNex ransomware victims since March 2024. The cryptographic weakness was... PC NEW DIAMORPHINE ROOTKIT VARIANT SEEN UNDETECTED IN THE WILD June 18, 2024by David Álvarez Introduction Code reuse is very frequent in malware, especially for those parts of the sample that are complex to develop or hard to write with an essentially different alternative code. By tracking both source code and object code, we efficiently detect new malware and track the evolution of... MobilePCReports AVAST Q1/2024 THREAT REPORT May 14, 2024by Threat Research Team Nearly 90% of Threats Blocked are Social Engineering, Revealing a Huge Surge of Scams, and Discovery of the Lazarus APT Campaign 2024 Copyright © Avast Software s.r.o. MENU * Mobile * Network * PC * IoT * Careers * Search CATEGORIES * Events * IoT * Mobile * Network * Other/Research * PC * Reports * Uncategorized TAGS analysis Android APT backdoor botnet brazil cryptocurrency cryptomining csrf ddos decryptor decryptors desktop DirtyMoe dns hijack dropper exploit fake-app ghostdns Google Play Store HW iot malware mobile obfuscation P-Code phishing ransomware rat report Research reversing risk rootkit router security series spyware stealer takedown threat-intel threats VB vulnerability worm RECENT POSTS * Decrypted: DoNex Ransomware and its Predecessors * New Diamorphine rootkit variant seen undetected in the wild * Avast Q1/2024 Threat Report * GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining * From BYOVD to a 0-day: Unveiling Advanced Exploits in Cyber Recruiting Scams ARCHIVE * July 2024 * June 2024 * May 2024 * April 2024 * February 2024 * January 2024 * December 2023 * November 2023 * October 2023 * September 2023 * August 2023 * July 2023 * June 2023 * May 2023 * April 2023 * February 2023 * January 2023 * December 2022 * November 2022 * October 2022 * September 2022 * August 2022 * July 2022 * June 2022 * May 2022 * April 2022 * March 2022 * February 2022 * January 2022 * December 2021 * November 2021 * October 2021 * September 2021 * August 2021 * July 2021 * June 2021 * May 2021 * April 2021 * March 2021 * February 2021 * December 2020 * November 2020 * October 2020 * September 2020 * August 2020 * June 2020 * May 2020 * April 2020 * December 2019 * September 2019 * August 2019 * July 2019 * April 2019 * March 2019 * February 2019 * January 2019 * August 2018 * January 2018 * October 2017 META * Log in * Entries feed * Comments feed * WordPress.org