General

  • Target

    08b2a0ba65a2a48444a5d5cbd386a6931dc650637069f1ddd7f78b92c9761602

  • Size

    428KB

  • Sample

    210908-sdechshhep

  • MD5

    00cb10c4e70d83a20f0956532adcf5c5

  • SHA1

    2d4e56a3b0c7847a34ca1a214527a09e1a2c767f

  • SHA256

    08b2a0ba65a2a48444a5d5cbd386a6931dc650637069f1ddd7f78b92c9761602

  • SHA512

    8accbd5d2e4082e903f7dedd35665ec7975862c58b04e8205ccd7289eca5d11057fe3717618ab54d9f161d3c48eb61e518ba49b32d11113f0e67004ac89675f0

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      08b2a0ba65a2a48444a5d5cbd386a6931dc650637069f1ddd7f78b92c9761602

    • Size

      428KB

    • MD5

      00cb10c4e70d83a20f0956532adcf5c5

    • SHA1

      2d4e56a3b0c7847a34ca1a214527a09e1a2c767f

    • SHA256

      08b2a0ba65a2a48444a5d5cbd386a6931dc650637069f1ddd7f78b92c9761602

    • SHA512

      8accbd5d2e4082e903f7dedd35665ec7975862c58b04e8205ccd7289eca5d11057fe3717618ab54d9f161d3c48eb61e518ba49b32d11113f0e67004ac89675f0

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks