General

  • Target

    5976234c53372d090d6e492466b89cca78972c187e18d5c2777b2d9f1a6f5828

  • Size

    511KB

  • Sample

    211021-bad4xahfh8

  • MD5

    7324485c0ee6ad7c7cbb00efe2a98842

  • SHA1

    62c6fbe79e502ab6ce7a5cdafa087a6adf546484

  • SHA256

    5976234c53372d090d6e492466b89cca78972c187e18d5c2777b2d9f1a6f5828

  • SHA512

    0e70b522bbaf490001ef85eb42928e6ef0a1e342b62fdd972ad62f4a2f9ca07111b9771dedf79560b0b6a1ccad7a36b1b454ec9d0327479d22570883682dde73

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      5976234c53372d090d6e492466b89cca78972c187e18d5c2777b2d9f1a6f5828

    • Size

      511KB

    • MD5

      7324485c0ee6ad7c7cbb00efe2a98842

    • SHA1

      62c6fbe79e502ab6ce7a5cdafa087a6adf546484

    • SHA256

      5976234c53372d090d6e492466b89cca78972c187e18d5c2777b2d9f1a6f5828

    • SHA512

      0e70b522bbaf490001ef85eb42928e6ef0a1e342b62fdd972ad62f4a2f9ca07111b9771dedf79560b0b6a1ccad7a36b1b454ec9d0327479d22570883682dde73

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks