General

  • Target

    usfive_20211024-013826

  • Size

    818KB

  • Sample

    211023-3xrgasddhn

  • MD5

    9589e2ff4d579cc048ad7759213a92f4

  • SHA1

    8cfea7f492b63d606140ee52f7ea2a966ac251dc

  • SHA256

    780e39283a52dab8a479fe819f1342cd8ae8c8ada87709006ac834d17e49d662

  • SHA512

    9f2866786450af6843df87a6c344e4235fa628f84de765de509a735dbab423e6214d75c3bb8bbd19866d8058ca124279567a2619c8e6359dd7481928cdf7ff5c

Malware Config

Extracted

Family

raccoon

Botnet

7c9b4504a63ed23664e38808e65948379b790395

Attributes
  • url4cnc

    http://telegka.top/capibar

    http://telegin.top/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Targets

    • Target

      usfive_20211024-013826

    • Size

      818KB

    • MD5

      9589e2ff4d579cc048ad7759213a92f4

    • SHA1

      8cfea7f492b63d606140ee52f7ea2a966ac251dc

    • SHA256

      780e39283a52dab8a479fe819f1342cd8ae8c8ada87709006ac834d17e49d662

    • SHA512

      9f2866786450af6843df87a6c344e4235fa628f84de765de509a735dbab423e6214d75c3bb8bbd19866d8058ca124279567a2619c8e6359dd7481928cdf7ff5c

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks