General

  • Target

    5c05d494382d63d9da1ef537ccb495dd90cc7f532d35637f3f0ea47efd1cb6b9

  • Size

    428KB

  • Sample

    210908-p8qr9ahfer

  • MD5

    273c1e6c1d684d65c1ac545b5bd3c9d8

  • SHA1

    421769f7cff0a417b0c90f29fd24e37007912744

  • SHA256

    5c05d494382d63d9da1ef537ccb495dd90cc7f532d35637f3f0ea47efd1cb6b9

  • SHA512

    2d208b07191cfb109ccfb3b43dff1ee7791496fd767fba7ea6a400af1fce04d7223f308eaa0f3a3571e0f310bc3623008359648b9560a06c81d1e6befe9f61be

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      5c05d494382d63d9da1ef537ccb495dd90cc7f532d35637f3f0ea47efd1cb6b9

    • Size

      428KB

    • MD5

      273c1e6c1d684d65c1ac545b5bd3c9d8

    • SHA1

      421769f7cff0a417b0c90f29fd24e37007912744

    • SHA256

      5c05d494382d63d9da1ef537ccb495dd90cc7f532d35637f3f0ea47efd1cb6b9

    • SHA512

      2d208b07191cfb109ccfb3b43dff1ee7791496fd767fba7ea6a400af1fce04d7223f308eaa0f3a3571e0f310bc3623008359648b9560a06c81d1e6befe9f61be

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks