General

  • Target

    3c2fa74521d7f42b3db7a084500d99d839a2e1cf3889e77a4642b1e979840f1a

  • Size

    421KB

  • Sample

    210908-cezrvaddh6

  • MD5

    bc561511417534b74c303a1558ba7a87

  • SHA1

    7c812adeb8639087b072c5bfda386e94dec0a83e

  • SHA256

    3c2fa74521d7f42b3db7a084500d99d839a2e1cf3889e77a4642b1e979840f1a

  • SHA512

    c0aab08ad070264124ed572ea3265af7bd288ef11c2c3d38a04b937f9f6eaade0cdff239fc4d49ffe1a11827eb212bf3e029acb9ee9fd1838690646e7b1535eb

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      3c2fa74521d7f42b3db7a084500d99d839a2e1cf3889e77a4642b1e979840f1a

    • Size

      421KB

    • MD5

      bc561511417534b74c303a1558ba7a87

    • SHA1

      7c812adeb8639087b072c5bfda386e94dec0a83e

    • SHA256

      3c2fa74521d7f42b3db7a084500d99d839a2e1cf3889e77a4642b1e979840f1a

    • SHA512

      c0aab08ad070264124ed572ea3265af7bd288ef11c2c3d38a04b937f9f6eaade0cdff239fc4d49ffe1a11827eb212bf3e029acb9ee9fd1838690646e7b1535eb

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks