General

  • Target

    f361159b66316a89d598d140488ddac584650269341457ebbb3433f592e3b8a8

  • Size

    428KB

  • Sample

    210908-yxp61sfag2

  • MD5

    236255d58aae88a3b3b5f1da00176978

  • SHA1

    fac5b39feab4323496bcea89945e3cc0e6ae91aa

  • SHA256

    f361159b66316a89d598d140488ddac584650269341457ebbb3433f592e3b8a8

  • SHA512

    9f13fb934e34f3dd8aa932a9af3f5a7cd6f0237150ff90b7309ae2f63202bc294cbc7dbe9f2adf24603cf4812a35f47ca5bd9fef74b93245eff0e4b32409f9be

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      f361159b66316a89d598d140488ddac584650269341457ebbb3433f592e3b8a8

    • Size

      428KB

    • MD5

      236255d58aae88a3b3b5f1da00176978

    • SHA1

      fac5b39feab4323496bcea89945e3cc0e6ae91aa

    • SHA256

      f361159b66316a89d598d140488ddac584650269341457ebbb3433f592e3b8a8

    • SHA512

      9f13fb934e34f3dd8aa932a9af3f5a7cd6f0237150ff90b7309ae2f63202bc294cbc7dbe9f2adf24603cf4812a35f47ca5bd9fef74b93245eff0e4b32409f9be

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks