General

  • Target

    bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0.exe

  • Size

    548KB

  • Sample

    210225-gfa4aqgw5n

  • MD5

    bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0

  • SHA1

    318923e7cb849bee7f09fe18ea79e506311fb100

  • SHA256

    7dca5264c8f0417686482b9f17571a60ac0e399180340deca165fe7fe2a9eb81

  • SHA512

    24a9d67c7760fc867368be65b8a607f4ff364941d820f5cae38ec06aff1ccb299449e18ac70335bf7bd732ce92f80d752f3c6cc695073c8b0ade3e8017b8e2c6

Malware Config

Extracted

Family

raccoon

Botnet

21caed469b59526d75348692eec1d8ae289ec69c

Attributes
  • url4cnc

    https://telete.in/j90maninblack

rc4.plain
rc4.plain

Targets

    • Target

      bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0.exe

    • Size

      548KB

    • MD5

      bfbc5c7fdfdaf8147dbf6d1e4ea3e4f0

    • SHA1

      318923e7cb849bee7f09fe18ea79e506311fb100

    • SHA256

      7dca5264c8f0417686482b9f17571a60ac0e399180340deca165fe7fe2a9eb81

    • SHA512

      24a9d67c7760fc867368be65b8a607f4ff364941d820f5cae38ec06aff1ccb299449e18ac70335bf7bd732ce92f80d752f3c6cc695073c8b0ade3e8017b8e2c6

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks