Rewterz Threat Alert – LockBit 3.0 Ransomware – Active IOCs
August 27, 2022Rewterz Threat Alert – Remcos RAT – Active IOCs
August 27, 2022Rewterz Threat Alert – LockBit 3.0 Ransomware – Active IOCs
August 27, 2022Rewterz Threat Alert – Remcos RAT – Active IOCs
August 27, 2022Severity
High
Analysis Summary
Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It was discovered in the wild for the first time in April 2019. This malware is a C++ program that allows you to steal data from common browsers and cryptocurrency wallets. Exploit kits are used to deploy the virus, which employs browser-based vulnerabilities to lead users to landing sites containing exploit codes. It’s also propagated through phishing efforts that persuade victims to run the malicious payload or macros. This info stealer collects related to the machine, such as the OS arch and version, hardware information, and installed apps.
On March 25, 2022 – a key developer died in the Russia-Ukraine War. Therefore the operator of Raccoon Stealer, who was
active on a dark web forum, temporarily suspended his operations. On May 17, 2022, the operator announced the completion
of the development of a new version of the stealer, and on June 9, the operator resumed activity on the dark web forum
Impact
- Data exfiltration
- Credential theft
- Financial loss
Indicators of Compromise
MD5
- 2855e46bcb7e997b0b9a53c8c89f457c
SHA-256
- 07934cba01c76edfad9112b736a866c486ccfd635b4e77285f9d8dceb7c5f2dd
SHA-1
- 8150d4fcbe49a84016fee8d624cc89799015e3e7
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.