General

  • Target

    10650c7727b5baccaddbdd2a8d2485f20093b6404aa2f5d18cc3e512a5b6458d

  • Size

    488KB

  • Sample

    211026-jrkxsahhar

  • MD5

    586f3e8d6ef076c770544b9a996fad93

  • SHA1

    6e6f6f3ee6fe760235e2e036956beeabc2f3b82f

  • SHA256

    10650c7727b5baccaddbdd2a8d2485f20093b6404aa2f5d18cc3e512a5b6458d

  • SHA512

    225d5fac49fc13eab7c55c6786cfa654c1a52defcb2e5e3a78eaf2dd804d8f5e506cf16f33e47f55f79b1ea2ec685675551050fc4340ab154c2889c7c5eea493

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      10650c7727b5baccaddbdd2a8d2485f20093b6404aa2f5d18cc3e512a5b6458d

    • Size

      488KB

    • MD5

      586f3e8d6ef076c770544b9a996fad93

    • SHA1

      6e6f6f3ee6fe760235e2e036956beeabc2f3b82f

    • SHA256

      10650c7727b5baccaddbdd2a8d2485f20093b6404aa2f5d18cc3e512a5b6458d

    • SHA512

      225d5fac49fc13eab7c55c6786cfa654c1a52defcb2e5e3a78eaf2dd804d8f5e506cf16f33e47f55f79b1ea2ec685675551050fc4340ab154c2889c7c5eea493

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks