General

  • Target

    9ae0147f80406c2c77c7311bf5781613774490dbd363a048024b9cd8167d4e4e

  • Size

    511KB

  • Sample

    211025-flft4afeg6

  • MD5

    021575c6c37adc63f60c8a15c1e508a3

  • SHA1

    7c240675bc728695ebb38e5421487b1ac5b3589a

  • SHA256

    9ae0147f80406c2c77c7311bf5781613774490dbd363a048024b9cd8167d4e4e

  • SHA512

    77523cc6095d44e10d51cc8d63a952e88cf1c0ce3103365717161d8236f9f1d5c51330fad92eae386daf69d11750e64f6b5df1005a94ca13f4fb3c70d1a5e704

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      9ae0147f80406c2c77c7311bf5781613774490dbd363a048024b9cd8167d4e4e

    • Size

      511KB

    • MD5

      021575c6c37adc63f60c8a15c1e508a3

    • SHA1

      7c240675bc728695ebb38e5421487b1ac5b3589a

    • SHA256

      9ae0147f80406c2c77c7311bf5781613774490dbd363a048024b9cd8167d4e4e

    • SHA512

      77523cc6095d44e10d51cc8d63a952e88cf1c0ce3103365717161d8236f9f1d5c51330fad92eae386daf69d11750e64f6b5df1005a94ca13f4fb3c70d1a5e704

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks