General

  • Target

    MIX3h1_20211030-174457

  • Size

    458KB

  • Sample

    211030-vk87ksbher

  • MD5

    17a4417f99be4e1fd6a8aead588964f3

  • SHA1

    1fe65589fc74c80bcedc52eedbd774036f9a5fcb

  • SHA256

    193532de47c00c9e4b934badee47b3f6cc8fd7b29c265509102474abfd6db97b

  • SHA512

    b171879e1d11840814c04718838867ea2b40b6111425844fd622acd9d9ad340be67e6e382e452ee71208379faf007e2f295fc81b7d15ec2823f79b553a67b9cc

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-174457

    • Size

      458KB

    • MD5

      17a4417f99be4e1fd6a8aead588964f3

    • SHA1

      1fe65589fc74c80bcedc52eedbd774036f9a5fcb

    • SHA256

      193532de47c00c9e4b934badee47b3f6cc8fd7b29c265509102474abfd6db97b

    • SHA512

      b171879e1d11840814c04718838867ea2b40b6111425844fd622acd9d9ad340be67e6e382e452ee71208379faf007e2f295fc81b7d15ec2823f79b553a67b9cc

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks