General

  • Target

    beb7064b03fd362a4c64b06d81c8f3156dad3c0139e9ef87b7fda319809f7e5e

  • Size

    428KB

  • Sample

    210908-lgh2jsecb4

  • MD5

    0e6f89cd989442f1d69441653d77fcdf

  • SHA1

    5d03fee3e322095d799181e533d70a7bfee63fdd

  • SHA256

    beb7064b03fd362a4c64b06d81c8f3156dad3c0139e9ef87b7fda319809f7e5e

  • SHA512

    37e195565a4aabc13be6d0e76ac5bb8479ea8cc83c6ee67d2d126e6568b6aa7e16ce5d75429aba7b9905151d38ea2c77fb05f7f1bd4354fd66e472ef1a700092

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      beb7064b03fd362a4c64b06d81c8f3156dad3c0139e9ef87b7fda319809f7e5e

    • Size

      428KB

    • MD5

      0e6f89cd989442f1d69441653d77fcdf

    • SHA1

      5d03fee3e322095d799181e533d70a7bfee63fdd

    • SHA256

      beb7064b03fd362a4c64b06d81c8f3156dad3c0139e9ef87b7fda319809f7e5e

    • SHA512

      37e195565a4aabc13be6d0e76ac5bb8479ea8cc83c6ee67d2d126e6568b6aa7e16ce5d75429aba7b9905151d38ea2c77fb05f7f1bd4354fd66e472ef1a700092

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks