General

  • Target

    54e188fbcff59d19493b1457e91e8b296cd38cc8e28a2159c3826781e8c4b566

  • Size

    511KB

  • Sample

    211025-epkf1sgeck

  • MD5

    893ffc081761d8d32064109a49920dd5

  • SHA1

    4b21a628cfd57c07fe64a93bb10768f5d96ee1f3

  • SHA256

    54e188fbcff59d19493b1457e91e8b296cd38cc8e28a2159c3826781e8c4b566

  • SHA512

    2b5e41c6b9b99b47e4061168fc68f9371b4c59c04593548111ff95acfc1971386fe10a77a283a86949467022a576787eafe5e2a301d64c666e6e2b941f5284da

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      54e188fbcff59d19493b1457e91e8b296cd38cc8e28a2159c3826781e8c4b566

    • Size

      511KB

    • MD5

      893ffc081761d8d32064109a49920dd5

    • SHA1

      4b21a628cfd57c07fe64a93bb10768f5d96ee1f3

    • SHA256

      54e188fbcff59d19493b1457e91e8b296cd38cc8e28a2159c3826781e8c4b566

    • SHA512

      2b5e41c6b9b99b47e4061168fc68f9371b4c59c04593548111ff95acfc1971386fe10a77a283a86949467022a576787eafe5e2a301d64c666e6e2b941f5284da

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks