

Rewterz Threat Alert – New SectopRAT Uses Second Desktop to Control Browsers
November 25, 2019
Rewterz Threat Advisory – CVE-2018-9195 – Hardcoded Cryptographic Key in the FortiGuard Services Communication Protocol Information Disclosure Vulnerability
November 26, 2019
Rewterz Threat Alert – New SectopRAT Uses Second Desktop to Control Browsers
November 25, 2019
Rewterz Threat Advisory – CVE-2018-9195 – Hardcoded Cryptographic Key in the FortiGuard Services Communication Protocol Information Disclosure Vulnerability
November 26, 2019Severity
High
Analysis Summary
Active since early 2019, the Raccoon infostealer has gained a large following of cybercriminal customers to a Malware-as-a-Service model. According to a Cofense report, it is now being used in a campaign that targeted a financial organization. The email that was analysed for the report is similar to many BEC emails in that it refers to a wire transfer and asks the recipient to view the attached file for details. Cofense speculate that the email may have been sent from a compromised account. The file itself is a .IMG file hosted on Dropbox. If the file is executed, it installs Raccoon on the victim system. Communications with the Raccoon C&C servers is carried out over HTTP. Raccoon has become popular for many reasons including that the license to use for a month costs only $200, features 24/7 customer support provided in both the English and Russian languages, and is available in both 32 and 64 bit versions.

Impact
Exposure of sensitive information
Indicators of Compromise
IP
34[.]89[.]185[.]248
MD5
- 0c8158e2a4267eea51e12b6890e68da8
- f7bcb18e5814db9fd51d0ab05f2d7ee9
SHA-256
- e04bbd216bf39330dc5a007937af25b2cc61a51ea402a3c6a0cd4ade137c5d04
- 19a2a1c2ee8d432c56cded783f9eb0026096990112bcd97f13e79de77bad2ad1
SHA1
- a0e613e89ea1dcac9758c395bc2d46ba6944a666
- 2963e100530c794e859bd850793db192fc7eb522
URL
- http[:]//34[.]89[.]185[.]248/file_handler/file[.]php
- http[:]//34[.]89[.]185[.]248/gate/libs[.]zip
- http[:]//34[.]89[.]185[.]248/gate/log[.]php
- http[:]//34[.]89[.]185[.]248/gate/sqlite3[.]dll
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.