General

  • Target

    eded177fb4b7636f77c6e43293dc733746035ace3a4d22c428355af905dc5d75

  • Size

    428KB

  • Sample

    210908-1wwzaafbd9

  • MD5

    d1ff5fd44acca5dfd22052217d9dde73

  • SHA1

    1cad8d8edf2f38c6fe59eb462f62c843231e837e

  • SHA256

    eded177fb4b7636f77c6e43293dc733746035ace3a4d22c428355af905dc5d75

  • SHA512

    4e6abce81297dee54142233580c1dacd2c9f71480cd8537333b755b2813f400d596183bb25af43d75861554d9e2fb72fe4b74def55281df8a74aa5aceec60c28

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      eded177fb4b7636f77c6e43293dc733746035ace3a4d22c428355af905dc5d75

    • Size

      428KB

    • MD5

      d1ff5fd44acca5dfd22052217d9dde73

    • SHA1

      1cad8d8edf2f38c6fe59eb462f62c843231e837e

    • SHA256

      eded177fb4b7636f77c6e43293dc733746035ace3a4d22c428355af905dc5d75

    • SHA512

      4e6abce81297dee54142233580c1dacd2c9f71480cd8537333b755b2813f400d596183bb25af43d75861554d9e2fb72fe4b74def55281df8a74aa5aceec60c28

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks