General

  • Target

    314e663114a97fc60337fb02bdff719cd835dfe9143db663ebe000fce488bc94

  • Size

    512KB

  • Sample

    211021-n1dmaaacb4

  • MD5

    1b86847b2a3fe5ccf47875d3832e72ce

  • SHA1

    f0659feb1664a188a65aa1d9802d18df2fd4d50c

  • SHA256

    314e663114a97fc60337fb02bdff719cd835dfe9143db663ebe000fce488bc94

  • SHA512

    0a8f88ee2c856f7f1fc233637adbc0ec84251b2a1e026c32d3bf11a385b6c08e877e815abecd9668a6bdedd0ccf47bcae5abeeda1645327c2564899b3fad3cc9

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      314e663114a97fc60337fb02bdff719cd835dfe9143db663ebe000fce488bc94

    • Size

      512KB

    • MD5

      1b86847b2a3fe5ccf47875d3832e72ce

    • SHA1

      f0659feb1664a188a65aa1d9802d18df2fd4d50c

    • SHA256

      314e663114a97fc60337fb02bdff719cd835dfe9143db663ebe000fce488bc94

    • SHA512

      0a8f88ee2c856f7f1fc233637adbc0ec84251b2a1e026c32d3bf11a385b6c08e877e815abecd9668a6bdedd0ccf47bcae5abeeda1645327c2564899b3fad3cc9

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks