General

  • Target

    dc6b4c331c6e83e7f89d59ec3f04ffb44f0c80e0073cfc6924c57580940f9a22

  • Size

    430KB

  • Sample

    211102-pms1gscee5

  • MD5

    66d742d072867417a4e3cc6d7b14c1d5

  • SHA1

    7f64c534e5b204cb89144504fcfe6e9552870831

  • SHA256

    dc6b4c331c6e83e7f89d59ec3f04ffb44f0c80e0073cfc6924c57580940f9a22

  • SHA512

    38dbdeb30950dc038fb7916113b3b81a4d87b11c02b95332dbd86c7c87e8b9ea41ef2172758e5f8320274474b88c060c3c91affa213da2d35452ca8ac9850083

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      dc6b4c331c6e83e7f89d59ec3f04ffb44f0c80e0073cfc6924c57580940f9a22

    • Size

      430KB

    • MD5

      66d742d072867417a4e3cc6d7b14c1d5

    • SHA1

      7f64c534e5b204cb89144504fcfe6e9552870831

    • SHA256

      dc6b4c331c6e83e7f89d59ec3f04ffb44f0c80e0073cfc6924c57580940f9a22

    • SHA512

      38dbdeb30950dc038fb7916113b3b81a4d87b11c02b95332dbd86c7c87e8b9ea41ef2172758e5f8320274474b88c060c3c91affa213da2d35452ca8ac9850083

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks