General

  • Target

    5bdc0766d86a74e58055a3940a27feca.exe

  • Size

    560KB

  • Sample

    211014-gysj4agcg2

  • MD5

    5bdc0766d86a74e58055a3940a27feca

  • SHA1

    efa03d9af76c4cc13fac9dfeaa173e662beca5d5

  • SHA256

    55927123aaddfc0c7d7b720e0f06aadd5bcc52d9b4955da3460b02561fb6447d

  • SHA512

    bd62121c5162ae11001d8200f7100d5eb734d69b3205adad73a7b19e96864194d4e9c385e0d97c5b22d6474b6febdee2857f9dc7c880b793a91b0c15aa33cded

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      5bdc0766d86a74e58055a3940a27feca.exe

    • Size

      560KB

    • MD5

      5bdc0766d86a74e58055a3940a27feca

    • SHA1

      efa03d9af76c4cc13fac9dfeaa173e662beca5d5

    • SHA256

      55927123aaddfc0c7d7b720e0f06aadd5bcc52d9b4955da3460b02561fb6447d

    • SHA512

      bd62121c5162ae11001d8200f7100d5eb734d69b3205adad73a7b19e96864194d4e9c385e0d97c5b22d6474b6febdee2857f9dc7c880b793a91b0c15aa33cded

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks