General

  • Target

    0916040dc8e703cd6cace723907027b3a8dc1cd87b756bcdd78a0a085def6493

  • Size

    534KB

  • Sample

    211021-2kefjaahc4

  • MD5

    70960815294244672738b9f1328812a4

  • SHA1

    ef0e7415ab0dcc4f7fbceb8e17522f9fc16c031b

  • SHA256

    0916040dc8e703cd6cace723907027b3a8dc1cd87b756bcdd78a0a085def6493

  • SHA512

    3c18b4dd68ae68178f9e25c89817388bb77082661e5d79877063081442727c98c9820cc8c5cadd822ac8bf1c3f615e602cb6be76325045a0f2dd6dc6057a69c5

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      0916040dc8e703cd6cace723907027b3a8dc1cd87b756bcdd78a0a085def6493

    • Size

      534KB

    • MD5

      70960815294244672738b9f1328812a4

    • SHA1

      ef0e7415ab0dcc4f7fbceb8e17522f9fc16c031b

    • SHA256

      0916040dc8e703cd6cace723907027b3a8dc1cd87b756bcdd78a0a085def6493

    • SHA512

      3c18b4dd68ae68178f9e25c89817388bb77082661e5d79877063081442727c98c9820cc8c5cadd822ac8bf1c3f615e602cb6be76325045a0f2dd6dc6057a69c5

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks