General

  • Target

    mixazed_20210604-150917

  • Size

    555KB

  • Sample

    210604-v7aww3k1a2

  • MD5

    62070cc23ba860995b41f6e03541bfcf

  • SHA1

    f8454f7bafd043b8335d8aa7fd0baff7fc418cf7

  • SHA256

    66371cf1cf1ac4a101cf4beacfbe00035f7ea2ecb7674d79bfceec34937c22ed

  • SHA512

    6af5046e61e658f08f0885b705ea788d720f4da80e011b1b7f91f58dc2641113f4d310e211d3a6146ba0138cd455c0d304769838807c2ea7316ad917f71439d8

Malware Config

Extracted

Family

raccoon

Botnet

28198d4512d0cf31c204eddceb4471d79950b588

Attributes
  • url4cnc

    https://tttttt.me/capibar

rc4.plain
rc4.plain

Targets

    • Target

      mixazed_20210604-150917

    • Size

      555KB

    • MD5

      62070cc23ba860995b41f6e03541bfcf

    • SHA1

      f8454f7bafd043b8335d8aa7fd0baff7fc418cf7

    • SHA256

      66371cf1cf1ac4a101cf4beacfbe00035f7ea2ecb7674d79bfceec34937c22ed

    • SHA512

      6af5046e61e658f08f0885b705ea788d720f4da80e011b1b7f91f58dc2641113f4d310e211d3a6146ba0138cd455c0d304769838807c2ea7316ad917f71439d8

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks