General

  • Target

    17dfb836ade4bec0799bc46fc199a393.exe

  • Size

    587KB

  • Sample

    211025-jetzxsggal

  • MD5

    17dfb836ade4bec0799bc46fc199a393

  • SHA1

    f4157cdedb42e0bac17f35f724276ae4d84e761b

  • SHA256

    88b8097ddd006cd54de00ea57d7d57c182df22fd4ba45629d922b5eae25ec786

  • SHA512

    1bb8396efc4bd674f377be3bb9a33ac7dcb1dac63d6210e9001431c14b104d00b6c2d11b2d388553b5afc79d62824bafd1a45955a74d20b5f19e26fc0a31d213

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      17dfb836ade4bec0799bc46fc199a393.exe

    • Size

      587KB

    • MD5

      17dfb836ade4bec0799bc46fc199a393

    • SHA1

      f4157cdedb42e0bac17f35f724276ae4d84e761b

    • SHA256

      88b8097ddd006cd54de00ea57d7d57c182df22fd4ba45629d922b5eae25ec786

    • SHA512

      1bb8396efc4bd674f377be3bb9a33ac7dcb1dac63d6210e9001431c14b104d00b6c2d11b2d388553b5afc79d62824bafd1a45955a74d20b5f19e26fc0a31d213

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks