General

  • Target

    MIX3h1_20211030-123542

  • Size

    459KB

  • Sample

    211030-nc69pabehl

  • MD5

    12b586d510b0f4dea6305d44ff6d7ad4

  • SHA1

    5ba3751061e22a5cccdf86355353f8c6dd1f7a66

  • SHA256

    46e130de5d270cbb370fa222a1b3819bb5413d19aabb2d576dcdab524972bf0d

  • SHA512

    a501b16885978a48801650b224fe24daa9f7d8cdf2bb805a25fe572a064719e7d3660d3d1ceafb12ac9fc9edad3e70a5adab9f002e7e696cfd23c18a738e011e

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-123542

    • Size

      459KB

    • MD5

      12b586d510b0f4dea6305d44ff6d7ad4

    • SHA1

      5ba3751061e22a5cccdf86355353f8c6dd1f7a66

    • SHA256

      46e130de5d270cbb370fa222a1b3819bb5413d19aabb2d576dcdab524972bf0d

    • SHA512

      a501b16885978a48801650b224fe24daa9f7d8cdf2bb805a25fe572a064719e7d3660d3d1ceafb12ac9fc9edad3e70a5adab9f002e7e696cfd23c18a738e011e

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks