General

  • Target

    4c0468c1cdb706db859ea545141a743f0c67cca789c7bdeba4b0c8d9f8054ff3

  • Size

    590KB

  • Sample

    211020-xpv7maaden

  • MD5

    d47b78eddf9a3a415e8ad8a9e3adf6aa

  • SHA1

    5035ce465ce692088b51948069f81c006c4869f9

  • SHA256

    4c0468c1cdb706db859ea545141a743f0c67cca789c7bdeba4b0c8d9f8054ff3

  • SHA512

    521720a39991af4b37e6146b581b618054095a8c266216a245de62f8021e802107ade50bc01064f44d3c529cff99756aacc0ff06bbd7bd783d411b94535fb49c

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      4c0468c1cdb706db859ea545141a743f0c67cca789c7bdeba4b0c8d9f8054ff3

    • Size

      590KB

    • MD5

      d47b78eddf9a3a415e8ad8a9e3adf6aa

    • SHA1

      5035ce465ce692088b51948069f81c006c4869f9

    • SHA256

      4c0468c1cdb706db859ea545141a743f0c67cca789c7bdeba4b0c8d9f8054ff3

    • SHA512

      521720a39991af4b37e6146b581b618054095a8c266216a245de62f8021e802107ade50bc01064f44d3c529cff99756aacc0ff06bbd7bd783d411b94535fb49c

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks