General

  • Target

    cc19b08cab5321375c385f0907d69734b66474b7da172998f2d237c9813c1321

  • Size

    488KB

  • Sample

    211026-g4ycjahgcn

  • MD5

    5f94c509fcc94ce815a58c759f02702d

  • SHA1

    de58678edce06750bc1a6c97bf382d02b41eac40

  • SHA256

    cc19b08cab5321375c385f0907d69734b66474b7da172998f2d237c9813c1321

  • SHA512

    57766e8835aa46124ae6b9a43555e3b1b5404be269899e0787a47ed021816ad0b07ae3ec456e28b3a3601c15ab4eba479c7a4fce486da6d0d66ebe6db5705aa1

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      cc19b08cab5321375c385f0907d69734b66474b7da172998f2d237c9813c1321

    • Size

      488KB

    • MD5

      5f94c509fcc94ce815a58c759f02702d

    • SHA1

      de58678edce06750bc1a6c97bf382d02b41eac40

    • SHA256

      cc19b08cab5321375c385f0907d69734b66474b7da172998f2d237c9813c1321

    • SHA512

      57766e8835aa46124ae6b9a43555e3b1b5404be269899e0787a47ed021816ad0b07ae3ec456e28b3a3601c15ab4eba479c7a4fce486da6d0d66ebe6db5705aa1

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks