General

  • Target

    0e9e98cde28f8dd9a22f642400452d84762785efeb72ecdf49c317d44624f181

  • Size

    513KB

  • Sample

    211021-xxkqvsafe4

  • MD5

    18b193c34923f4f2aa44fb8675f64993

  • SHA1

    30d430349129b556546c085f92baa2034853471f

  • SHA256

    0e9e98cde28f8dd9a22f642400452d84762785efeb72ecdf49c317d44624f181

  • SHA512

    b2001ce78c83318304c9740365e7ef0db5830bb156c73c398baac38d65e3a27f5a4d603860de6ff65d8c270f5eb53a20f3c648c93d69e917cd51ef38a501cd21

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      0e9e98cde28f8dd9a22f642400452d84762785efeb72ecdf49c317d44624f181

    • Size

      513KB

    • MD5

      18b193c34923f4f2aa44fb8675f64993

    • SHA1

      30d430349129b556546c085f92baa2034853471f

    • SHA256

      0e9e98cde28f8dd9a22f642400452d84762785efeb72ecdf49c317d44624f181

    • SHA512

      b2001ce78c83318304c9740365e7ef0db5830bb156c73c398baac38d65e3a27f5a4d603860de6ff65d8c270f5eb53a20f3c648c93d69e917cd51ef38a501cd21

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks