General

  • Target

    68e1ba282aedafbe31d7a15af8f28362.exe

  • Size

    526KB

  • Sample

    210415-trs259l6ce

  • MD5

    68e1ba282aedafbe31d7a15af8f28362

  • SHA1

    4ee583fc154e4f6e6d44bcc44c9039c19ee37167

  • SHA256

    7396e6b887ea90222eebcbb2772a8618d59d93d9bcd33c61e306e2b70bb0c3ff

  • SHA512

    131add98dccbe9052d35366b290788146271cb5a2079307b3a3a1ddcf58417e125139e0c892b9a6702ab560d4b3875da38b50ff21e67665956893dc6773cfd39

Malware Config

Extracted

Family

raccoon

Botnet

f6a4646c17af7db77b0a5aba1906d97ffcdd34ed

Attributes
  • url4cnc

    https://telete.in/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      68e1ba282aedafbe31d7a15af8f28362.exe

    • Size

      526KB

    • MD5

      68e1ba282aedafbe31d7a15af8f28362

    • SHA1

      4ee583fc154e4f6e6d44bcc44c9039c19ee37167

    • SHA256

      7396e6b887ea90222eebcbb2772a8618d59d93d9bcd33c61e306e2b70bb0c3ff

    • SHA512

      131add98dccbe9052d35366b290788146271cb5a2079307b3a3a1ddcf58417e125139e0c892b9a6702ab560d4b3875da38b50ff21e67665956893dc6773cfd39

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks