General

  • Target

    57c76b3fca5268f32241a7fd99c0db548dde9af869b9ff9baf6f93823c5d0b91

  • Size

    476KB

  • Sample

    211025-nt7lsaghhk

  • MD5

    65d395941ecfdc4654c3f916c688802f

  • SHA1

    6191928bf94651a0adde48beecedb71ed1a0dc2e

  • SHA256

    57c76b3fca5268f32241a7fd99c0db548dde9af869b9ff9baf6f93823c5d0b91

  • SHA512

    daf00d48216cd39257c5c763cc97bf13a97313e9497388572b140f89d1efb737ad5880215517e545f405121237c98a9d0f97f37f7c5961d18b57ea14d92c2afa

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      57c76b3fca5268f32241a7fd99c0db548dde9af869b9ff9baf6f93823c5d0b91

    • Size

      476KB

    • MD5

      65d395941ecfdc4654c3f916c688802f

    • SHA1

      6191928bf94651a0adde48beecedb71ed1a0dc2e

    • SHA256

      57c76b3fca5268f32241a7fd99c0db548dde9af869b9ff9baf6f93823c5d0b91

    • SHA512

      daf00d48216cd39257c5c763cc97bf13a97313e9497388572b140f89d1efb737ad5880215517e545f405121237c98a9d0f97f37f7c5961d18b57ea14d92c2afa

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks