Analysis by: Jeffrey Francis Bonaobra

ALIASES:

Trojan:Win32/Raccoon.RA!MTB (MICROSOFT)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan Spy

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

Canal de infección Downloaded from the Internet, Dropped by other malware

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible.

  TECHNICAL DETAILS

Tamaño del archivo 414,152 bytes
Residente en memoria No
Fecha de recepción de las muestras iniciales 18 Sep 2022
Carga útil Connects to URLs/IPs, Steals information

Arrival Details

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Information Theft

This Trojan Spy gathers the following data:

  • Gathers the following system information:
    • IP Address
    • Country
    • ZIP Code
    • User Name
    • Product Name
    • OS Architecture
    • Screen Resolution
    • System Language
    • CPU Information
    • GPU Information
    • Serial Number of Physical Disk Drives
    • List of Installed Browsers
    • List of Installed Antivirus Software
    • List of Running Processes
    • List of Installed Programs
  • Gathers information from:
    • Browsers:
      • Chromium Based Browsers
      • Gecko Based Browsers
    • FTP Clients:
      • FileZilla
    • Messaging Applications:
      • Telegram
    • VPN:
      • ProtonVPN
      • NordVPN
      • OpenVPN
    • Others:
      • Discord
      • Steam
  • Browser Extensions:
    • Autofill data
    • Browser data (login information, cookies) relating to the following wallets:
      • YoroiWallet
      • Tronlink
      • NiftyWallet
      • Metamask
      • MathWallet
      • Coinbase
      • BinanceChain
      • BraveWallet
      • GuardaWallet
      • EqualWallet
      • JaxxxLiberty
      • BitAppWallet
      • iWallet
      • Wombat
      • AtomicWallet
      • MewCx
      • GuildWallet
      • SaturnWallet
      • RoninWallet
      • TerraStation
      • HarmonyWallet
      • Coin98Wallet
      • TonCrystal
      • KardiaChain
      • Phantom
      • Oxygen
      • PaliWallet
      • BoltX
      • LiqualityWallet
      • XdefiWallet
      • NamiWallet
      • MaiarDeFiWallet
      • Authenticator
      • TempleWallet
    • Saved credit cards
    • Login information
    • Browser cookies

Other Details

This Trojan Spy connects to the following URL(s) to get the affected system's IP address:

  • https://{BLOCKED}i.{BLOCKED}p.sb/ip

It connects to the following website to send and receive information:

  • {BLOCKED}.{BLOCKED}.81.20:16640

It does the following:

  • It terminates itself if the following modules are loaded in memory:
    • mscorjit.dll
    • clrjit.dll
  • It terminates itself if the environment variable Cor_Enable_Profiling is 0x1.
  • It can avoid certain countries and IP addresses depending on the configuration received.

However, as of this writing, the said sites are inaccessible.

  SOLUTION

Motor de exploración mínimo 9.800
Primer archivo de patrones de VSAPI 17.820.04
Primera fecha de publicación de patrones de VSAPI 18 Sep 2022
Versión de patrones OPR de VSAPI 17.821.00
Fecha de publicación de patrones OPR de VSAPI 19 Sep 2022

Step 1

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 2

Scan your computer with your Trend Micro product to delete files detected as TrojanSpy.Win32.REDLINESTEALER.YNCIR. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.