General

  • Target

    7db9e18c3608ce5011bcfe6068563f7dad0ab364.exe

  • Size

    502KB

  • Sample

    210910-qb5etadcal

  • MD5

    61fb5efac6fa998122301f32145e8a9e

  • SHA1

    7db9e18c3608ce5011bcfe6068563f7dad0ab364

  • SHA256

    4200a6c60752a877536a362b4964b66c55b43d8ade0c9e2f746c532968e3e507

  • SHA512

    16b64878a51fdcb8c71aee3b0829ea8f94842ecc86778bd62ade00ca8e284efb9f4160fdbd2fc0942dc4f01e5eb600295e4fdfb79bf258986219e687657ff15c

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      7db9e18c3608ce5011bcfe6068563f7dad0ab364.exe

    • Size

      502KB

    • MD5

      61fb5efac6fa998122301f32145e8a9e

    • SHA1

      7db9e18c3608ce5011bcfe6068563f7dad0ab364

    • SHA256

      4200a6c60752a877536a362b4964b66c55b43d8ade0c9e2f746c532968e3e507

    • SHA512

      16b64878a51fdcb8c71aee3b0829ea8f94842ecc86778bd62ade00ca8e284efb9f4160fdbd2fc0942dc4f01e5eb600295e4fdfb79bf258986219e687657ff15c

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks