General

  • Target

    0ddf0fdf46c0491d55dc9237f622f48801e59b0a9819ea4b0bf34db3e0fdc3b6

  • Size

    512KB

  • Sample

    211021-qlmyhsada6

  • MD5

    a897cb0c73b44180832bb83bdc1cc7c5

  • SHA1

    cff14d2ec235aa7b3147a61971c34e1672ccc7d2

  • SHA256

    0ddf0fdf46c0491d55dc9237f622f48801e59b0a9819ea4b0bf34db3e0fdc3b6

  • SHA512

    defba907b124fda2756900c084acd23610b659ff58fed21358ba0878f7dce2f9ced6408ab10843ff6a81b2f3bdf516201afa07a765e5f228b88b45d1b2cede6b

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      0ddf0fdf46c0491d55dc9237f622f48801e59b0a9819ea4b0bf34db3e0fdc3b6

    • Size

      512KB

    • MD5

      a897cb0c73b44180832bb83bdc1cc7c5

    • SHA1

      cff14d2ec235aa7b3147a61971c34e1672ccc7d2

    • SHA256

      0ddf0fdf46c0491d55dc9237f622f48801e59b0a9819ea4b0bf34db3e0fdc3b6

    • SHA512

      defba907b124fda2756900c084acd23610b659ff58fed21358ba0878f7dce2f9ced6408ab10843ff6a81b2f3bdf516201afa07a765e5f228b88b45d1b2cede6b

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks