General

  • Target

    2ecabe6b2ed81e5466ad0f2a2ff27bd63cdab48ab4d2b2e49c69ce8022a21e0c

  • Size

    450KB

  • Sample

    211028-yjdk3acbd8

  • MD5

    7d88f59f1405e54fb1866480bd6188a3

  • SHA1

    451e0b279cd8d6ed605d9d15501b23a72f74636d

  • SHA256

    2ecabe6b2ed81e5466ad0f2a2ff27bd63cdab48ab4d2b2e49c69ce8022a21e0c

  • SHA512

    49d726a265af14056718c389405a1d1314442d1fb1986385949a359d9506aa648146708dc40a3909316a811887966259b2185e18df3a1e2923d1fa97fefe6e48

Malware Config

Extracted

Family

raccoon

Botnet

60e59be328fbd2ebac1839ea99411dccb00a6f49

Attributes
  • url4cnc

    http://telegin.top/agrybirdsgamerept

    http://ttmirror.top/agrybirdsgamerept

    http://teletele.top/agrybirdsgamerept

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      2ecabe6b2ed81e5466ad0f2a2ff27bd63cdab48ab4d2b2e49c69ce8022a21e0c

    • Size

      450KB

    • MD5

      7d88f59f1405e54fb1866480bd6188a3

    • SHA1

      451e0b279cd8d6ed605d9d15501b23a72f74636d

    • SHA256

      2ecabe6b2ed81e5466ad0f2a2ff27bd63cdab48ab4d2b2e49c69ce8022a21e0c

    • SHA512

      49d726a265af14056718c389405a1d1314442d1fb1986385949a359d9506aa648146708dc40a3909316a811887966259b2185e18df3a1e2923d1fa97fefe6e48

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks