[Mal Series #4] InfoStealer Raccoon

The malware is extract from the dropper which is similar to Aggah campaign.

Unfortunately, can’t proceed the analysis further as there is some issue with the respond from c2 server 😔. Maybe they removed the support for this build.

Error message from C2

However, still try my best to get all remaining the things done.

Get username
Windows API:
1) GetUserName

Get machine GUID
Get GUID by reading the value in regkey SOFTWARE/MICROSOFT/CRYPTOGRAPHY

Create bot_id by concatenate GUID and username

Windows API:
1) RegOpenKey
2) RegQueryValue
3) RegCloseKey

Check Country
Is Russian, Ukranian, Belarusian, Kazakh, Krygyz, Armenian, Tajik, Uzbek?
If yes, quit the process. No, continue malicious act.

Windows API:
1) GetLocaleInfoA
2) GetUserDefaultLCID


Encrypted C2 strings from the google drive url respond

Send POST request to C2 server with parameter
bot_id=%machineGUID%_%username%&config_id=%configID%&data=null which is encoded wit base64.

Error from C2 makes my analysis stuck here …

GDrive Link (to reveal the address of C&C server)

C&C (To get the config and required files)



Typical memes addict🐒 GitHub: https://github.com/ghoulgy 🍕Support my work: https://www.buymeacoffee.com/GhoulSec