General

  • Target

    MIX3h1_20211030-224001

  • Size

    458KB

  • Sample

    211030-zpz7pacbal

  • MD5

    5388ccfaefc8d4928408fb97d0bf2eeb

  • SHA1

    c28be50cb746d993b888bae7a1b0afd9dc8c16a4

  • SHA256

    e7c145efbd531051e6574eaab741902f95e9a62e724d684bd03ccf2479a2c0e6

  • SHA512

    f605b1034f131eb4ff345da09367ff7366d3f5a9793f9381e86775fbcd2e00c56f162fc0c53022c53c1e61f8c5e93729b494d9da4708c0af1900fbdd96a8945a

Malware Config

Extracted

Family

raccoon

Botnet

eae58d570cc74796157b14c575bd3adc01116ca0

Attributes
  • url4cnc

    http://telegka.top/rino115sipsip

    http://telegin.top/rino115sipsip

    https://t.me/rino115sipsip

rc4.plain
rc4.plain

Targets

    • Target

      MIX3h1_20211030-224001

    • Size

      458KB

    • MD5

      5388ccfaefc8d4928408fb97d0bf2eeb

    • SHA1

      c28be50cb746d993b888bae7a1b0afd9dc8c16a4

    • SHA256

      e7c145efbd531051e6574eaab741902f95e9a62e724d684bd03ccf2479a2c0e6

    • SHA512

      f605b1034f131eb4ff345da09367ff7366d3f5a9793f9381e86775fbcd2e00c56f162fc0c53022c53c1e61f8c5e93729b494d9da4708c0af1900fbdd96a8945a

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks