Rewterz Threat Alert – Ramnit Malware – Active IOCs
July 2, 2022Rewterz Threat Alert – MuddyWater APT – Active IOCs
July 2, 2022Rewterz Threat Alert – Ramnit Malware – Active IOCs
July 2, 2022Rewterz Threat Alert – MuddyWater APT – Active IOCs
July 2, 2022Severity
High
Analysis Summary
Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It was discovered in the wild for the first time in April 2019. This malware is a C++ program that allows you to steal data from common browsers and cryptocurrency wallets. Exploit kits are used to deploy the virus, which employs browser-based vulnerabilities to lead users to landing sites containing exploit codes. It’s also propagated through phishing efforts that persuade victims to run the malicious payload or macros. This info stealer collects related to the machine, such as the OS arch and version, hardware information, and installed apps.
On March 25, 2022 – a key developer died in the Russia-Ukraine War. Therefore the operator of Raccoon Stealer, who was
active on a dark web forum, temporarily suspended his operations. On May 17, 2022, the operator announced the completion
of the development of a new version of the stealer, and on June 9, the operator resumed activity on the dark web forum
Impact
- Data exfiltration
- Credential theft
- Financial loss
Indicators of Compromise
MD5
- c5ce68e5feabffe94ce4309e9e278a91
SHA-256
- 2911be45ad496dd1945f95c47b7f7738ad03849329fcec9c464dfaeb5081f67e
SHA-1
- ab272e68f0e09391e3675cf8cda344774ae98769
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.