General

  • Target

    1fd58564618d3f48770144a30ef2421e.exe

  • Size

    461KB

  • Sample

    210302-gjz24rjbss

  • MD5

    1fd58564618d3f48770144a30ef2421e

  • SHA1

    0937964464e18ad5b73290512ee80c70a6146b1c

  • SHA256

    5ab8788113048f70c035d2f84de34cc2a5cb08533474b917e47893bea3daac2a

  • SHA512

    3cdcf3c6c91829d353ac82f930615a5e755479ac28e57ecc8d4a6406ddd1d90f5a304a4d130df685bd1200ddc60c0b633db4f7699be6ad22035ce7af02d915bc

Malware Config

Extracted

Family

raccoon

Botnet

a3a85b69314053c3bb015532d1a960a3d08baeb8

Attributes
  • url4cnc

    https://telete.in/baudemars

rc4.plain
rc4.plain

Targets

    • Target

      1fd58564618d3f48770144a30ef2421e.exe

    • Size

      461KB

    • MD5

      1fd58564618d3f48770144a30ef2421e

    • SHA1

      0937964464e18ad5b73290512ee80c70a6146b1c

    • SHA256

      5ab8788113048f70c035d2f84de34cc2a5cb08533474b917e47893bea3daac2a

    • SHA512

      3cdcf3c6c91829d353ac82f930615a5e755479ac28e57ecc8d4a6406ddd1d90f5a304a4d130df685bd1200ddc60c0b633db4f7699be6ad22035ce7af02d915bc

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks