General

  • Target

    fedcb488da8aebc2b9bab8ce9fba1111585a4e97d2066e16f6e577d31b4e6e84

  • Size

    428KB

  • Sample

    210908-xnvvgaabfq

  • MD5

    4c61c1498c02bf80ac87c028745d2bbd

  • SHA1

    c731d6839bc7479f02a8f0b484b0fc2e1ec39976

  • SHA256

    fedcb488da8aebc2b9bab8ce9fba1111585a4e97d2066e16f6e577d31b4e6e84

  • SHA512

    14dd27252cdc96b240b14e1b753f7d9015b5fdc68fe1047ca02c4d3a33ac892b8345b1321e69255d79254c483ac69701032934f5e4609f2206e71c44868bd293

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      fedcb488da8aebc2b9bab8ce9fba1111585a4e97d2066e16f6e577d31b4e6e84

    • Size

      428KB

    • MD5

      4c61c1498c02bf80ac87c028745d2bbd

    • SHA1

      c731d6839bc7479f02a8f0b484b0fc2e1ec39976

    • SHA256

      fedcb488da8aebc2b9bab8ce9fba1111585a4e97d2066e16f6e577d31b4e6e84

    • SHA512

      14dd27252cdc96b240b14e1b753f7d9015b5fdc68fe1047ca02c4d3a33ac892b8345b1321e69255d79254c483ac69701032934f5e4609f2206e71c44868bd293

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks