General

  • Target

    a18cfe1f3ca4f947b5f03fe47bc69f210a935eb3aa15d24539c5c3ea5f3bf57d

  • Size

    425KB

  • Sample

    211102-qnf8rahehq

  • MD5

    5a4fa2903d889ce7a8b5fc38bbfd50eb

  • SHA1

    a629a790ac592d46a640388950493dde855fb7d1

  • SHA256

    a18cfe1f3ca4f947b5f03fe47bc69f210a935eb3aa15d24539c5c3ea5f3bf57d

  • SHA512

    28b0e8918906c0b8efa74377420bbd85dd63afceb2cd41cacf302125b001916ec5285138c2cb94b43821bed2529782e74316dbac302d23b4492f9d4b55a5db92

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      a18cfe1f3ca4f947b5f03fe47bc69f210a935eb3aa15d24539c5c3ea5f3bf57d

    • Size

      425KB

    • MD5

      5a4fa2903d889ce7a8b5fc38bbfd50eb

    • SHA1

      a629a790ac592d46a640388950493dde855fb7d1

    • SHA256

      a18cfe1f3ca4f947b5f03fe47bc69f210a935eb3aa15d24539c5c3ea5f3bf57d

    • SHA512

      28b0e8918906c0b8efa74377420bbd85dd63afceb2cd41cacf302125b001916ec5285138c2cb94b43821bed2529782e74316dbac302d23b4492f9d4b55a5db92

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks