General

  • Target

    806fc4f90ba86e3c71821db995c80bfa.exe

  • Size

    526KB

  • Sample

    210415-w1f9sf2nxn

  • MD5

    806fc4f90ba86e3c71821db995c80bfa

  • SHA1

    cec04276534cb7de15cf1ee969717372ae799e66

  • SHA256

    e906adc81c7aa287b3a410216d9e659f5202c152f9eb1e997fd1ad4a7ed7de48

  • SHA512

    2a9dca398111a80e426c5eb9de1545275613adedb5217691cd37c090a68ebad7d3296f97178d9b0fa7ca81dc53618e4883c62a957b0d8359ef9fc8f87b25207f

Malware Config

Extracted

Family

raccoon

Botnet

5442f281fb8a4ac6d19427ed61032791e65b8e1b

Attributes
  • url4cnc

    https://telete.in/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      806fc4f90ba86e3c71821db995c80bfa.exe

    • Size

      526KB

    • MD5

      806fc4f90ba86e3c71821db995c80bfa

    • SHA1

      cec04276534cb7de15cf1ee969717372ae799e66

    • SHA256

      e906adc81c7aa287b3a410216d9e659f5202c152f9eb1e997fd1ad4a7ed7de48

    • SHA512

      2a9dca398111a80e426c5eb9de1545275613adedb5217691cd37c090a68ebad7d3296f97178d9b0fa7ca81dc53618e4883c62a957b0d8359ef9fc8f87b25207f

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks