General

  • Target

    MIX3h1_20211030-133720

  • Size

    459KB

  • Sample

    211030-rkyt3afad7

  • MD5

    a101c47afb0f68ca9e536d183040c339

  • SHA1

    d341de58afd8441063660f9c393dbace86cb287f

  • SHA256

    b0e37566690fc65b62845c25c98193e0670582ee7b310bba13e4b32a0183c484

  • SHA512

    5afa8e17c4ca4ec5d78760999f3befc04e2e9c4270cf990a94ff55721a940b379a56c5b3533cfd00cb79d814f7560a0436bf1d1f8f39a6d696c3becdc5d79096

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-133720

    • Size

      459KB

    • MD5

      a101c47afb0f68ca9e536d183040c339

    • SHA1

      d341de58afd8441063660f9c393dbace86cb287f

    • SHA256

      b0e37566690fc65b62845c25c98193e0670582ee7b310bba13e4b32a0183c484

    • SHA512

      5afa8e17c4ca4ec5d78760999f3befc04e2e9c4270cf990a94ff55721a940b379a56c5b3533cfd00cb79d814f7560a0436bf1d1f8f39a6d696c3becdc5d79096

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks