Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    02-11-2021 13:42

General

  • Target

    414c453b8a1e3e5a1f09b06b8d12ad76.exe

  • Size

    431KB

  • MD5

    414c453b8a1e3e5a1f09b06b8d12ad76

  • SHA1

    0c67387c0746d2df0b79acbf937bb636979c6a7c

  • SHA256

    422b03c3a614d7db59c9ce93ec53fda6c6ccb6233ebb822c998471a16e1a884e

  • SHA512

    d98046081fc499707a5b2c0bf677cc61a942cba8673481fef8cf95ab31b5b93e103d354a9d7fbf427d4008605165c4b6c0e255e0d3c686f785f98f972851bae9

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\414c453b8a1e3e5a1f09b06b8d12ad76.exe
    "C:\Users\Admin\AppData\Local\Temp\414c453b8a1e3e5a1f09b06b8d12ad76.exe"
    1⤵
      PID:1880

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1880-54-0x00000000759B1000-0x00000000759B3000-memory.dmp
      Filesize

      8KB

    • memory/1880-55-0x0000000001C10000-0x0000000001C5E000-memory.dmp
      Filesize

      312KB

    • memory/1880-56-0x0000000001C60000-0x0000000001CEE000-memory.dmp
      Filesize

      568KB

    • memory/1880-57-0x0000000000400000-0x0000000000491000-memory.dmp
      Filesize

      580KB