General

  • Target

    791e3fb231f63c0a0b5a22be8f0672b0d6b9d187894990f59ccde897f9df0a74

  • Size

    421KB

  • Sample

    210907-3nwpnaddc6

  • MD5

    ec75b552a1ad1a752808023c2e27725a

  • SHA1

    97248d6f5a9d8124d3ad37755613fe3b3178f2ad

  • SHA256

    791e3fb231f63c0a0b5a22be8f0672b0d6b9d187894990f59ccde897f9df0a74

  • SHA512

    849b24f4c750bd22f6dc53ab489b9d9caa9489f5c77b22314a112330af26950d7066a24281e9bc84ccdff16b7fe895655517785154f9740f77d461561b7fb53a

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      791e3fb231f63c0a0b5a22be8f0672b0d6b9d187894990f59ccde897f9df0a74

    • Size

      421KB

    • MD5

      ec75b552a1ad1a752808023c2e27725a

    • SHA1

      97248d6f5a9d8124d3ad37755613fe3b3178f2ad

    • SHA256

      791e3fb231f63c0a0b5a22be8f0672b0d6b9d187894990f59ccde897f9df0a74

    • SHA512

      849b24f4c750bd22f6dc53ab489b9d9caa9489f5c77b22314a112330af26950d7066a24281e9bc84ccdff16b7fe895655517785154f9740f77d461561b7fb53a

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks