General

  • Target

    c6dd2a66f449b29f1103c60b570065b9022f3071f8b0ea8ed9c005138d63b1e3

  • Size

    512KB

  • Sample

    211020-3hvv6shfe9

  • MD5

    41c481b497cbd81c1cabe8c1f5ff7134

  • SHA1

    50e719d8f7217951974a60c704806833b31fb958

  • SHA256

    c6dd2a66f449b29f1103c60b570065b9022f3071f8b0ea8ed9c005138d63b1e3

  • SHA512

    7e4029264e1d0a83184e1c9bddc6de31b70dadb03c788110873a3aebff5316d57cd51eb02448e377176090775e1ca8436d31288b304fb48253aa3f7d3e5661a0

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      c6dd2a66f449b29f1103c60b570065b9022f3071f8b0ea8ed9c005138d63b1e3

    • Size

      512KB

    • MD5

      41c481b497cbd81c1cabe8c1f5ff7134

    • SHA1

      50e719d8f7217951974a60c704806833b31fb958

    • SHA256

      c6dd2a66f449b29f1103c60b570065b9022f3071f8b0ea8ed9c005138d63b1e3

    • SHA512

      7e4029264e1d0a83184e1c9bddc6de31b70dadb03c788110873a3aebff5316d57cd51eb02448e377176090775e1ca8436d31288b304fb48253aa3f7d3e5661a0

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks