General

  • Target

    mixinte_20211012-163750

  • Size

    533KB

  • Sample

    211012-y67gnadabk

  • MD5

    74754761590799ed2a86b21c1643cd91

  • SHA1

    2d648bc3296362495f43e75e91411cdb380568f1

  • SHA256

    7d6a042176703870dd488d2b4d53b50a9f38cd552ac05dbec65b5f612bbacb0a

  • SHA512

    5abdb9c97162458f6c9420f6babeb47651b33bba56fcf05d287a39897bd695121a5f4525cdb6fc701ed546e0aafe7b740b8689b8b71a69fc1f9ec21eba075bfd

Malware Config

Extracted

Family

raccoon

Version

1.8.2

Botnet

8b1cccc4d9c4808469e507e47787671255de6bf2

Attributes
  • url4cnc

    http://teletop.top/capibar

    http://teleta.top/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Targets

    • Target

      mixinte_20211012-163750

    • Size

      533KB

    • MD5

      74754761590799ed2a86b21c1643cd91

    • SHA1

      2d648bc3296362495f43e75e91411cdb380568f1

    • SHA256

      7d6a042176703870dd488d2b4d53b50a9f38cd552ac05dbec65b5f612bbacb0a

    • SHA512

      5abdb9c97162458f6c9420f6babeb47651b33bba56fcf05d287a39897bd695121a5f4525cdb6fc701ed546e0aafe7b740b8689b8b71a69fc1f9ec21eba075bfd

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks