General

  • Target

    13333D8111107CCE84E50C0264E4B3FFA7AF34802DE26.exe

  • Size

    396KB

  • Sample

    210620-a9sc83ppn6

  • MD5

    01f848f1bea5fee38c9b3ace82d48517

  • SHA1

    bd35c42b99d9c5e4e136505030f3d8f62f33d04f

  • SHA256

    13333d8111107cce84e50c0264e4b3ffa7af34802de26de7d229ca86782db674

  • SHA512

    e86e4f88f5ba7d1dcfad9f04b937dbc4c858b4bfdf51f94fe89f4e37d210b23aec40624a5b7c42f9d66d096dc174dcb6d30bae54d06cfe603ff6a837d707786f

Malware Config

Extracted

Family

raccoon

Botnet

16992cd33145ccbb6feeacb4e84400a56448fa14

Attributes
  • url4cnc

    https://telete.in/baudemars

rc4.plain
rc4.plain

Targets

    • Target

      13333D8111107CCE84E50C0264E4B3FFA7AF34802DE26.exe

    • Size

      396KB

    • MD5

      01f848f1bea5fee38c9b3ace82d48517

    • SHA1

      bd35c42b99d9c5e4e136505030f3d8f62f33d04f

    • SHA256

      13333d8111107cce84e50c0264e4b3ffa7af34802de26de7d229ca86782db674

    • SHA512

      e86e4f88f5ba7d1dcfad9f04b937dbc4c858b4bfdf51f94fe89f4e37d210b23aec40624a5b7c42f9d66d096dc174dcb6d30bae54d06cfe603ff6a837d707786f

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks