General

  • Target

    MIX3h1_20211030-065543

  • Size

    459KB

  • Sample

    211030-ndbt6seha7

  • MD5

    ec8da97e6896d173298c5cdd03f84b3f

  • SHA1

    96f2bd0090230116b63e8cea5851d94fd5509693

  • SHA256

    505cbc7ff89de44084e926ead2fec2e7782cd018267266e899436cbde8c3c39b

  • SHA512

    1ffcb8521f721521e32415a4d0f729c9bec0598181a5bb6ef3d963fa4fd38b95002a8574ca1e131feae2d367caded4a588e485724978b9d4cb56c74ffae4edf6

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-065543

    • Size

      459KB

    • MD5

      ec8da97e6896d173298c5cdd03f84b3f

    • SHA1

      96f2bd0090230116b63e8cea5851d94fd5509693

    • SHA256

      505cbc7ff89de44084e926ead2fec2e7782cd018267266e899436cbde8c3c39b

    • SHA512

      1ffcb8521f721521e32415a4d0f729c9bec0598181a5bb6ef3d963fa4fd38b95002a8574ca1e131feae2d367caded4a588e485724978b9d4cb56c74ffae4edf6

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks