General

  • Target

    MIX3h1_20211030-100111

  • Size

    459KB

  • Sample

    211030-nc91ksbehn

  • MD5

    9ed4728f2436ed9023616503ee106206

  • SHA1

    fcb00c6eb446d0577fa47ae56cd9d121f7c3cb01

  • SHA256

    c8d7e2983a439780d42734ee8085de7cd0c1181e2be8f9e5389e473c5903cd13

  • SHA512

    681e587175755c26943902c78b34de9900ea51bf4ffffff70c4a2c0454b445193cb85c23f102ab48b5c5a7e462352fd10774c5d38628f68c408dfb497e073527

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-100111

    • Size

      459KB

    • MD5

      9ed4728f2436ed9023616503ee106206

    • SHA1

      fcb00c6eb446d0577fa47ae56cd9d121f7c3cb01

    • SHA256

      c8d7e2983a439780d42734ee8085de7cd0c1181e2be8f9e5389e473c5903cd13

    • SHA512

      681e587175755c26943902c78b34de9900ea51bf4ffffff70c4a2c0454b445193cb85c23f102ab48b5c5a7e462352fd10774c5d38628f68c408dfb497e073527

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks