General

  • Target

    be6f8c611eb46b3629b33241e819dcad91fde2b3e9e94af00b85adc915d09c3e

  • Size

    428KB

  • Sample

    210908-v3f9hseha7

  • MD5

    feb0313883137179f6a1c3fd45e00784

  • SHA1

    613c6d999ebfd6522d0d652a176f8fdfca661e14

  • SHA256

    be6f8c611eb46b3629b33241e819dcad91fde2b3e9e94af00b85adc915d09c3e

  • SHA512

    c7ec4358620ab77a71a20f71c861ecf192972da296f8c1ad1b71ffd48340470d72eab018b4050360e731e5fc43b26a78a8a90fd69fd63170e25a28df2cc4bd0d

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      be6f8c611eb46b3629b33241e819dcad91fde2b3e9e94af00b85adc915d09c3e

    • Size

      428KB

    • MD5

      feb0313883137179f6a1c3fd45e00784

    • SHA1

      613c6d999ebfd6522d0d652a176f8fdfca661e14

    • SHA256

      be6f8c611eb46b3629b33241e819dcad91fde2b3e9e94af00b85adc915d09c3e

    • SHA512

      c7ec4358620ab77a71a20f71c861ecf192972da296f8c1ad1b71ffd48340470d72eab018b4050360e731e5fc43b26a78a8a90fd69fd63170e25a28df2cc4bd0d

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks