General

  • Target

    cc4fa960070563fc9cef883fdccbafe5ad5854395c977c2a912eab64e42e3298

  • Size

    513KB

  • Sample

    211021-rv8f9aadh2

  • MD5

    fd1766799cbda943c43982df2265fbf2

  • SHA1

    cb46fcb38cde8292198e9ca9c4fc3b74b314b26c

  • SHA256

    cc4fa960070563fc9cef883fdccbafe5ad5854395c977c2a912eab64e42e3298

  • SHA512

    0faa51f9bde1f001344088ff5bfc843abfe075ec61c04d790570c10332aee3a428af017490b7f308839be1c517fdf2271c4f0d0979183995e06969c12c9417cf

Malware Config

Extracted

Family

raccoon

Botnet

887a0ffaca448362277f2227182491216b734133

Attributes
  • url4cnc

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      cc4fa960070563fc9cef883fdccbafe5ad5854395c977c2a912eab64e42e3298

    • Size

      513KB

    • MD5

      fd1766799cbda943c43982df2265fbf2

    • SHA1

      cb46fcb38cde8292198e9ca9c4fc3b74b314b26c

    • SHA256

      cc4fa960070563fc9cef883fdccbafe5ad5854395c977c2a912eab64e42e3298

    • SHA512

      0faa51f9bde1f001344088ff5bfc843abfe075ec61c04d790570c10332aee3a428af017490b7f308839be1c517fdf2271c4f0d0979183995e06969c12c9417cf

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks