General

  • Target

    2e6beaa23ce16b876ed362c97a0b9cfd9077568727c5b9ab46c2667ccbc95955

  • Size

    534KB

  • Sample

    211021-2s1zhaahc9

  • MD5

    2bf5e5fd0d2073af4c093fe31eec915e

  • SHA1

    8a26bfc2b226d90d2151937c8d8ec4375509a03c

  • SHA256

    2e6beaa23ce16b876ed362c97a0b9cfd9077568727c5b9ab46c2667ccbc95955

  • SHA512

    6793fcb7c49db0923b6bb6baf984fdb6c32765c87009966ce4581e9e3df1ebd070b7e16cefb54826745170c84fc9cdba7f37430de6d8943bc4a69bbccfd4c8a5

Malware Config

Extracted

Family

raccoon

Botnet

ac738e6383a48d6a74aeab7c52ebcd50f76032ee

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      2e6beaa23ce16b876ed362c97a0b9cfd9077568727c5b9ab46c2667ccbc95955

    • Size

      534KB

    • MD5

      2bf5e5fd0d2073af4c093fe31eec915e

    • SHA1

      8a26bfc2b226d90d2151937c8d8ec4375509a03c

    • SHA256

      2e6beaa23ce16b876ed362c97a0b9cfd9077568727c5b9ab46c2667ccbc95955

    • SHA512

      6793fcb7c49db0923b6bb6baf984fdb6c32765c87009966ce4581e9e3df1ebd070b7e16cefb54826745170c84fc9cdba7f37430de6d8943bc4a69bbccfd4c8a5

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks