General

  • Target

    6f26a1e2adc76f70ceccaee9e22027416063985429859246e6e8e2baef9d4f21

  • Size

    512KB

  • Sample

    211021-rtg8nsadg5

  • MD5

    94aa4cf17fc91e8911480bc24914840f

  • SHA1

    fd3ee02ca77952e595e189b99fd38f66ad27fe34

  • SHA256

    6f26a1e2adc76f70ceccaee9e22027416063985429859246e6e8e2baef9d4f21

  • SHA512

    16b6a25e5a2037a1bd99888e228db3136094bf6fb063f185305c3e5d0c9cfccd01da2bc0dc66e6e98dd680f7507b32bf9c738cca40e57e0d7d58342992803322

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      6f26a1e2adc76f70ceccaee9e22027416063985429859246e6e8e2baef9d4f21

    • Size

      512KB

    • MD5

      94aa4cf17fc91e8911480bc24914840f

    • SHA1

      fd3ee02ca77952e595e189b99fd38f66ad27fe34

    • SHA256

      6f26a1e2adc76f70ceccaee9e22027416063985429859246e6e8e2baef9d4f21

    • SHA512

      16b6a25e5a2037a1bd99888e228db3136094bf6fb063f185305c3e5d0c9cfccd01da2bc0dc66e6e98dd680f7507b32bf9c738cca40e57e0d7d58342992803322

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks