General

  • Target

    5fe07134abda38e8870c74150caa6b68.exe

  • Size

    465KB

  • Sample

    211029-gcsmzacfd4

  • MD5

    5fe07134abda38e8870c74150caa6b68

  • SHA1

    2e50a2dd334ce25c29c09f89e71c42b3242de3ac

  • SHA256

    4ac1fd5714d68c3a015611027bd42bd354207d7f9c8417a63a4da31295580ffd

  • SHA512

    f4088ff3414956574b82f7f8b6f5648eeb924a9c5c9dab687c6187a765aa24652219185c8da7d0214fef566b19ca357fb55a9a878becd4c76f8b97e12006c088

Malware Config

Extracted

Family

raccoon

Botnet

60e59be328fbd2ebac1839ea99411dccb00a6f49

Attributes
  • url4cnc

    http://telegin.top/agrybirdsgamerept

    http://ttmirror.top/agrybirdsgamerept

    http://teletele.top/agrybirdsgamerept

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      5fe07134abda38e8870c74150caa6b68.exe

    • Size

      465KB

    • MD5

      5fe07134abda38e8870c74150caa6b68

    • SHA1

      2e50a2dd334ce25c29c09f89e71c42b3242de3ac

    • SHA256

      4ac1fd5714d68c3a015611027bd42bd354207d7f9c8417a63a4da31295580ffd

    • SHA512

      f4088ff3414956574b82f7f8b6f5648eeb924a9c5c9dab687c6187a765aa24652219185c8da7d0214fef566b19ca357fb55a9a878becd4c76f8b97e12006c088

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks