General

  • Target

    eufive_20210616-233809

  • Size

    572KB

  • Sample

    210616-mt3mnpyv7n

  • MD5

    aff24adcac0d43fdedf7f1fca5010d43

  • SHA1

    9b085a92dd390a87969054750fc4df0f3ab3ca23

  • SHA256

    22229ae10d0454005bd584838fc73c39027751e8953727d77cba63191ff9b3ce

  • SHA512

    4ae5763f41e9d86b04bc1cde044afaa39a44e911bad7b07df0e252445bd602026192856014a98662ce92788620689511169c03c9bd011c02d61f025631edc2a0

Malware Config

Extracted

Family

raccoon

Botnet

3d7990f080e9dcb56104447e3789dec4380efc8b

Attributes
  • url4cnc

    https://telete.in/jvadikkamushkin

rc4.plain
rc4.plain

Targets

    • Target

      eufive_20210616-233809

    • Size

      572KB

    • MD5

      aff24adcac0d43fdedf7f1fca5010d43

    • SHA1

      9b085a92dd390a87969054750fc4df0f3ab3ca23

    • SHA256

      22229ae10d0454005bd584838fc73c39027751e8953727d77cba63191ff9b3ce

    • SHA512

      4ae5763f41e9d86b04bc1cde044afaa39a44e911bad7b07df0e252445bd602026192856014a98662ce92788620689511169c03c9bd011c02d61f025631edc2a0

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks