General

  • Target

    a757355e7887d48635d3699d9b0c5f5175e714a2833836505f77abaa5c992647

  • Size

    428KB

  • Sample

    210908-pphyasedh3

  • MD5

    ffc26ef0169f1805af2b00fae3a2a4b5

  • SHA1

    07d653601aad41d80a66a4b1565177c2e507c525

  • SHA256

    a757355e7887d48635d3699d9b0c5f5175e714a2833836505f77abaa5c992647

  • SHA512

    0304003363264fa4464904dcb441ad203ec34c5696b183e3d87b628d9b5c7657a4e78e9fe7113f5fe55c18bf408fe05a33363b628441495bef787041ce844874

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      a757355e7887d48635d3699d9b0c5f5175e714a2833836505f77abaa5c992647

    • Size

      428KB

    • MD5

      ffc26ef0169f1805af2b00fae3a2a4b5

    • SHA1

      07d653601aad41d80a66a4b1565177c2e507c525

    • SHA256

      a757355e7887d48635d3699d9b0c5f5175e714a2833836505f77abaa5c992647

    • SHA512

      0304003363264fa4464904dcb441ad203ec34c5696b183e3d87b628d9b5c7657a4e78e9fe7113f5fe55c18bf408fe05a33363b628441495bef787041ce844874

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks