General

  • Target

    fcea00665a48c40c3dcb166a405610b88cff71d2f273068f0e579db705fcd0a6

  • Size

    512KB

  • Sample

    211021-jv3l1aaab8

  • MD5

    50f0faa28d7fdd85933d73a7f480c3df

  • SHA1

    0344c559e713f0785ef94d08eba7dac65cc8cb2d

  • SHA256

    fcea00665a48c40c3dcb166a405610b88cff71d2f273068f0e579db705fcd0a6

  • SHA512

    a19ccf29edcd88bbcc543b37041870c422e77682e901be7801de96b96065b2bd4fde5db0555d01bf3e2e1099a3db9d3733db0ca354499b6acb173baa4cb666ff

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      fcea00665a48c40c3dcb166a405610b88cff71d2f273068f0e579db705fcd0a6

    • Size

      512KB

    • MD5

      50f0faa28d7fdd85933d73a7f480c3df

    • SHA1

      0344c559e713f0785ef94d08eba7dac65cc8cb2d

    • SHA256

      fcea00665a48c40c3dcb166a405610b88cff71d2f273068f0e579db705fcd0a6

    • SHA512

      a19ccf29edcd88bbcc543b37041870c422e77682e901be7801de96b96065b2bd4fde5db0555d01bf3e2e1099a3db9d3733db0ca354499b6acb173baa4cb666ff

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks