General

  • Target

    D606.exe

  • Size

    464KB

  • Sample

    210215-mwxjzas9d6

  • MD5

    ffe1f03c368682ff74e1afb81d942b38

  • SHA1

    07ed92225f918b18270ada0a732ae19f7c11937f

  • SHA256

    aaa098acf52ceeec391b4b908124e1bf4a54d32873bac058a599a31f97976af8

  • SHA512

    a425b7ced1cf3254f85e886946eb4a8bfd12824f52ab1ba7cea8501c3af703e8a490ed9466285d723a3cb1b9fe1f1ebdb89df3d18b9f50b485574013ba4ed350

Malware Config

Extracted

Family

raccoon

Botnet

432398ed35a38284a2ec6ca3dc2fbccda76618de

Attributes
  • url4cnc

    https://telete.in/bItalianoespanol

rc4.plain
rc4.plain

Targets

    • Target

      D606.exe

    • Size

      464KB

    • MD5

      ffe1f03c368682ff74e1afb81d942b38

    • SHA1

      07ed92225f918b18270ada0a732ae19f7c11937f

    • SHA256

      aaa098acf52ceeec391b4b908124e1bf4a54d32873bac058a599a31f97976af8

    • SHA512

      a425b7ced1cf3254f85e886946eb4a8bfd12824f52ab1ba7cea8501c3af703e8a490ed9466285d723a3cb1b9fe1f1ebdb89df3d18b9f50b485574013ba4ed350

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks