General

  • Target

    82b6d44d_extracted

  • Size

    578KB

  • Sample

    210216-wqr1dxknme

  • MD5

    b79ada707b3394d00585fe7a91579c7c

  • SHA1

    bb840823b134f2d44d0126d0e6d0be87c3896c61

  • SHA256

    c21d2a1aa12173face28c52092e4137b152c5317d0b8ad40d71b1cf6088da702

  • SHA512

    37fa18d684690d7e9e0fa65ae081535021b5f4d8fc5c5154446873c751115da69588e84cad28e36f5c3a2c5c92cd367af60259c500ce547bcaf4ab1a275885f9

Malware Config

Extracted

Family

raccoon

Botnet

63d2dd318ba358625f17b35a68eefb259475f3c2

Attributes
  • url4cnc

    https://telete.in/jrubixred

rc4.plain
rc4.plain

Targets

    • Target

      82b6d44d_extracted

    • Size

      578KB

    • MD5

      b79ada707b3394d00585fe7a91579c7c

    • SHA1

      bb840823b134f2d44d0126d0e6d0be87c3896c61

    • SHA256

      c21d2a1aa12173face28c52092e4137b152c5317d0b8ad40d71b1cf6088da702

    • SHA512

      37fa18d684690d7e9e0fa65ae081535021b5f4d8fc5c5154446873c751115da69588e84cad28e36f5c3a2c5c92cd367af60259c500ce547bcaf4ab1a275885f9

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks