General

  • Target

    2eaf696f66b19b9329f23458c73bffb6.exe

  • Size

    488KB

  • Sample

    211026-pkf8xahdb6

  • MD5

    2eaf696f66b19b9329f23458c73bffb6

  • SHA1

    b7decb2f51e3dda393806de8be2a55545dc13135

  • SHA256

    3afa401a164d6cb1ba9ee8836c8f2af6c2bd445896bdf986a2385fa52e9e8c2d

  • SHA512

    8e51ce6c39d8fbf64b283a90d3d255cb74c29313af4d9e5f29ccc9402246f2b366a7d4f7b43a277f8b0d1faffb06fe5852f456543e7bf1e7690f154f69d476c1

Malware Config

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      2eaf696f66b19b9329f23458c73bffb6.exe

    • Size

      488KB

    • MD5

      2eaf696f66b19b9329f23458c73bffb6

    • SHA1

      b7decb2f51e3dda393806de8be2a55545dc13135

    • SHA256

      3afa401a164d6cb1ba9ee8836c8f2af6c2bd445896bdf986a2385fa52e9e8c2d

    • SHA512

      8e51ce6c39d8fbf64b283a90d3d255cb74c29313af4d9e5f29ccc9402246f2b366a7d4f7b43a277f8b0d1faffb06fe5852f456543e7bf1e7690f154f69d476c1

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks