Raccoon Stealer’s Abuse of Google Cloud Services and Multiple Delivery Techniques
With additional insights/analysis from Augusto Remillano II and Don Ovid Ladores
Raccoon emerged as Malware as a Service (MaaS) last April 2019. Despite its simplicity, Raccoon became popular among cybercriminals and was mentioned as a notable emerging malware in underground forums in a malware popularity report.
The malware is capable of stealing login credentials, credit card information, cryptocurrency wallets, and browser information. Raccoon has basic infostealer functions but an aggressive marketing campaign and overall good user experience proved enough to make up for its lack of additional features. The service is also relatively cheap, with a price that ranged from US$75 per week to $200 per month.
It can arrive on a system through different delivery techniques such as exploit kits, phishing, and bundled with other malware. In this blog entry we investigate campaigns that used the exploit kits Fallout and Rig, where we also observed its use of Google Drive as part of its evasion tactics.
Exploit kits
We have recorded the Rig exploit kit and two cases that used the Fallout exploit kits being used to drop the Raccoon stealer in July and October 2019. The infection chain of these three cases are summarized in the table below.
Fallout October 31, 2019 |
Fallout October 10, 2019 |
Rig July 15, 2019 |
|
Arrival | Malvertisement maximili[.]com (173.254.98.143) |
Malvertisement hxxps://biome.es/php.php (31.31.198.19) |
Ad Network hxxp://p201298[.]mybetterdl[.]com/adServe/domainClick?{redacted} hxxp://mybetterdl[.]com/aS/feedclick?{redacted} |
Redirector | hxxps://coliqiou[.]com/gzJrZZ?&se_referrer= (5.188.60.95) | hxxp://makemoneyeazywith[.]me/?utm_trc=ASIA{redacted} | |
EK URL | hxxp://getyourfree[.]cloud/3966/rerelease-8383/24-07-1920[.]aspx (134.209.185.112) | hxxps://germanrights4u[.]com/2010-03-08/ypiNv/unengaged?PdohQ=UEmE (104.248.32.22) | hxxp://185[.]246[.]65[.]115/?MzkxMTg3&pbcHJYg&Cb{redacted} |
Racoon malware dropped (SHA256) | c0127722274b1b821443ee5d6a8f59e7d01e75eb32c41b8a74a11e950d6bbf80 | 697706505adf5b5d051eddb1047cd158f6488c54a113a71c0a38942c7d29d91e | 1f2f7f34743b5869f37398d0427875bc34b4244d6094298aa828a6af63730b72 |
C&C Server | hxxp://35[.]189[.]105[.]242/file_handler/file[.]php?{redacted} | hxxp://34[.]89[.]185[.]248/file_handler/file[.]php?{redacted} | hxxp://34[.]65[.]241[.]219/file_handler2/file[.]php?{redacted}
|
Table 1. Infection chain of the two exploit kits
Once the Raccoon malware infects a machine, it connects to a Google Drive URL to decrypt the actual C&C server. The format of the URL is hxxp://{IP}/gate/log.php, which logs the computer configuration information. Then, it will receive a JSON-formatted file containing the location dependencies. Next, it will connect to URL hxxp://{IP}/file_handler/file.php for data exfiltration. Finally, it downloads FoxMail-like components from /gate/libs.zip and a SQLite library for parsing the browser database from hxxp://{IP}/gate/sqlite3.dll.
We identified 67 IP addresses that act as its C&C sever. Based on the organization ID of the IP addresses we could see that the attackers used Google Cloud Services to host many of their C&Cs. This technique allows the attackers to evade detection as it pretends to be legitimate traffic coming from Google.
It is important to note that not all the IP addresses used by the malware were related to Google. For example, an IP from Lithuania (176[.]223[.]143[.]5) resolved a domain named raccoon-gate[.]site[.]. Other Raccoon samples were also found connected to this C&C server, which drops another malware, the infostealer Predator the Thief.
Spam campaign
We also recently detected a spike in MalSpam activity. Included in this detection are spam with attachments that drop the Raccoon malware (detected as TrojanSpy.Win32.RACEALER.M). The emails claimed that the recipient’s friend had their email hacked, either by the sender themselves or by some other group. Although more recent iterations claimed that the recipient’s own email had been hacked. The emails demand money in exchange for the stolen sensitive information they claim to have accessed.
Figure 1. Sample spam mail containing the Raccoon malware attachment
A sample from this campaign downloads the typical libraries required for its infostealing routines from the C&C server. Aside from downloading the libraries, the raccoon sample also downloads an executable binary from hxxp://hrcorp1[.]site/signed.exe. This component would then drop and extract an archive, help.zip, which contains the appropriately named evil.ps1 PowerShell script.
Figure 2. Part of the strings inside the Raccoon stealer binary that indicate some of the browsers it would steal information from
Impact and Activity
Since April 2019, we have detected more than 100,000 raccoon related events. We observed a peak in detections in July 2019 that could be reflective of the number of buyers who were then using the service. The most affected countries were India and Japan. India seems to be growing into a popular target for such schemes, as recently stolen cards had shown up for sale in the Jokerstash underground market. Other countries in the Americas were also affected, specifically Colombia, Canada, United States, Mexico, Bolivia, and Peru.
Figure 3. Countries affected by Raccoon malware since April 2019
We have also identified over 3,000 unique binary samples of the Raccoon “Racestealer” stealer since the second quarter of 2019. There were several samples of the malware created, with the author continuing to release newer versions on underground forums since the first one came out.
Figure 4. Number of unique Raccoon samples
(Q1 data up to March 23)
Conclusion
Part of what makes the Raccoon MaaS popular among cybercriminals is the purported active “customer support” behind the service that makes up for the simple features. According the report by Cybereason, the MaaS received generally favorable reviews from those who have had the chance to use it. A number have described it as a suitable replacement to the discontinued AZORult stealer, which was popular during its heyday.
The current activity of the Raccoon malware seems to indicate that its development and use by threat actors will continue. The next best move for its creators would likely be to improve and fix some of its bugs, and then add new techniques to its relatively basic repertoire.
As creators work on developing Raccoon further, threat actors who have bought its services could be planning or deploying attacks using the version currently available in the underground market. Organizations should remain wary of the Raccoon malware and prepare defenses that take cues from the multiple deployment methods Raccoon has been known to employ.
Trend Micro Solutions
Organizations can take advantage of Trend Micro Apex One
Trend Micro
- Rule 4364: “RACCOON – HTTP (REQUEST)”
Indicators of Compromise (IoCs)
SHA256 | Detection name |
3787e7d0d8fd8496bf1425a05dddf8f6f0fee7d8782a2e6bd46a91239986171f | TrojanSpy.Win32.RACEALER.E |
48957252e011d2763e6f9ec5499e011d38c9f06b1c3fb6084c0255422d01dafe | Trojan.Win32.RACEALER.AB |
6e2bcde33b15acb157a38a857b5391d497a3f647ee02cb7da76cb82cb9b434f2 | TrojanSpy.MSIL.RACOONSTIL.A |
b4fbcced40a53bf818d6d13d0dde9147ddd17e423fe4d3d2a80401035b571112 | TrojanSpy.Win32.RACEALER.M |
URLs |
hxxp://drive[.]google[.]com/uc?export=download&id=1QQXAXArU8BU4kJZ6IBsSCCyLtmLftiOV – contains encrypted C&C server URL: |
hxxp://35[.]228[.]215[.]155/gate/log[.]php |
hxxp://35[.]228[.]215[.]155/gate/sqlite3[.]dll |
hxxp://35[.]228[.]215[.]155/gate/libs[.]zip |
hxxp://35[.]228[.]215[.]155/file_handler/file[.]php?hash={redacted} |
hxxp://34[.]77[.]125[.]60/gate/sqlite3[.]dll |
hxxp://34[.]77[.]125[.]60/gate/libs[.]zip |
hxxp://hrcorp1[.]site/signed[.]exe |
The post Raccoon Stealer’s Abuse of Google Cloud Services and Multiple Delivery Techniques appeared first on .