General

  • Target

    d43fcd3d203060dd6c5c9d6e65d46274e3576763fd18fe43656b443f389ed197

  • Size

    475KB

  • Sample

    211025-n7g82sgba3

  • MD5

    fa9ae41c646f17e26dd7cf1cba60957b

  • SHA1

    2e2edc578be90d2a1470651e76a426410e5453bb

  • SHA256

    d43fcd3d203060dd6c5c9d6e65d46274e3576763fd18fe43656b443f389ed197

  • SHA512

    558cbfdf3f1cd8666ed2fa8050ee6c5726786852ca50592358f91ba1150f4883a0bdb3ec795aea331cbed9e6ffb6d635795c2ad344107e345278a2133f80b9b2

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      d43fcd3d203060dd6c5c9d6e65d46274e3576763fd18fe43656b443f389ed197

    • Size

      475KB

    • MD5

      fa9ae41c646f17e26dd7cf1cba60957b

    • SHA1

      2e2edc578be90d2a1470651e76a426410e5453bb

    • SHA256

      d43fcd3d203060dd6c5c9d6e65d46274e3576763fd18fe43656b443f389ed197

    • SHA512

      558cbfdf3f1cd8666ed2fa8050ee6c5726786852ca50592358f91ba1150f4883a0bdb3ec795aea331cbed9e6ffb6d635795c2ad344107e345278a2133f80b9b2

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks