General

  • Target

    6a73750e3e3bafcf6899add27ba974952bc5330e9defa0648e0def4ebd63d0e7

  • Size

    587KB

  • Sample

    211020-v4ahcsaceq

  • MD5

    0cb21fe364bfc37fe9a60dfe47bf560a

  • SHA1

    a7bd7bc58fbcd5c69190d76af7f96e4b01e8d36d

  • SHA256

    6a73750e3e3bafcf6899add27ba974952bc5330e9defa0648e0def4ebd63d0e7

  • SHA512

    73007283e26e53f81ff6f93d81f088bde2c4cfc0867a3bfa1fd35a90f5a99bc43add56148919f962a7469f383b39d0939ed2fe1c19a43828b4de821d36073bcb

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      6a73750e3e3bafcf6899add27ba974952bc5330e9defa0648e0def4ebd63d0e7

    • Size

      587KB

    • MD5

      0cb21fe364bfc37fe9a60dfe47bf560a

    • SHA1

      a7bd7bc58fbcd5c69190d76af7f96e4b01e8d36d

    • SHA256

      6a73750e3e3bafcf6899add27ba974952bc5330e9defa0648e0def4ebd63d0e7

    • SHA512

      73007283e26e53f81ff6f93d81f088bde2c4cfc0867a3bfa1fd35a90f5a99bc43add56148919f962a7469f383b39d0939ed2fe1c19a43828b4de821d36073bcb

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks