General

  • Target

    MIX3h1_20211030-032053

  • Size

    459KB

  • Sample

    211030-ndc28seha8

  • MD5

    af44247d44df4993e4abbdcebb610007

  • SHA1

    da626b221f62360a3289bde6f1469f96cf2fc0b5

  • SHA256

    b18ccc62970f1f7c5bc2a685c8380ab11ca560385ab1b7308d8b69a44a930ccb

  • SHA512

    49ad4ba167f46ab744421146213ffd8766c9284c21b60a5865e7cbd20b92a3c8e35da372e5cf52287b95b3131953342834478b60dab5ff6d1110fb5193f5a1b1

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-032053

    • Size

      459KB

    • MD5

      af44247d44df4993e4abbdcebb610007

    • SHA1

      da626b221f62360a3289bde6f1469f96cf2fc0b5

    • SHA256

      b18ccc62970f1f7c5bc2a685c8380ab11ca560385ab1b7308d8b69a44a930ccb

    • SHA512

      49ad4ba167f46ab744421146213ffd8766c9284c21b60a5865e7cbd20b92a3c8e35da372e5cf52287b95b3131953342834478b60dab5ff6d1110fb5193f5a1b1

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks