General

  • Target

    0747720e9c5f43d72727ce1e0eed4d386ac6ac846397687093a54e01f893694d

  • Size

    421KB

  • Sample

    210908-a6x18agfcn

  • MD5

    735663c8244850c231877a89014b0472

  • SHA1

    172bccf8368812f17c4d788082a03c1be030158c

  • SHA256

    0747720e9c5f43d72727ce1e0eed4d386ac6ac846397687093a54e01f893694d

  • SHA512

    d336ed1dfbef5d909f68e2cefdeb817cdcda840e644d0ef10052ab42a7de294167a7d05eb7849eb59c9d52039156696914d712b359724db43f92a8004518b66e

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      0747720e9c5f43d72727ce1e0eed4d386ac6ac846397687093a54e01f893694d

    • Size

      421KB

    • MD5

      735663c8244850c231877a89014b0472

    • SHA1

      172bccf8368812f17c4d788082a03c1be030158c

    • SHA256

      0747720e9c5f43d72727ce1e0eed4d386ac6ac846397687093a54e01f893694d

    • SHA512

      d336ed1dfbef5d909f68e2cefdeb817cdcda840e644d0ef10052ab42a7de294167a7d05eb7849eb59c9d52039156696914d712b359724db43f92a8004518b66e

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks