General

  • Target

    e7ea4734d598700443d55277390b942f6f064d325f0c8f2cfdf206742e4cf4a9

  • Size

    590KB

  • Sample

    211020-yd146sadfm

  • MD5

    5b728af4c33268b5a4fa5f99051c0b12

  • SHA1

    532426b41ae299c5eddc910f963b6f2ce39585f9

  • SHA256

    e7ea4734d598700443d55277390b942f6f064d325f0c8f2cfdf206742e4cf4a9

  • SHA512

    5bdc1858f7a1ad2a1970bd6554d30d45c67eac4aa3dd86a0f3cb980596dbafb0e152760fd480900c2e2db9d488efbbbcf266b5ae9e9e72b495f5a0c899fcfb3a

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      e7ea4734d598700443d55277390b942f6f064d325f0c8f2cfdf206742e4cf4a9

    • Size

      590KB

    • MD5

      5b728af4c33268b5a4fa5f99051c0b12

    • SHA1

      532426b41ae299c5eddc910f963b6f2ce39585f9

    • SHA256

      e7ea4734d598700443d55277390b942f6f064d325f0c8f2cfdf206742e4cf4a9

    • SHA512

      5bdc1858f7a1ad2a1970bd6554d30d45c67eac4aa3dd86a0f3cb980596dbafb0e152760fd480900c2e2db9d488efbbbcf266b5ae9e9e72b495f5a0c899fcfb3a

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks