General

  • Target

    9d7eba7d03e758b765ac79128d92de1ce6e5549a6f00317aecf122108ca694fc

  • Size

    538KB

  • Sample

    211103-a1s53shhgj

  • MD5

    5d4ccb23e6db806d72c6a46fb5c01187

  • SHA1

    b9b83778057133f04455cd251bd1aeb1e2054de9

  • SHA256

    9d7eba7d03e758b765ac79128d92de1ce6e5549a6f00317aecf122108ca694fc

  • SHA512

    d630f4155656b94a562a2c34e47c5cc74eb54c2ffb9ee5874052eef1ccc10c9fb637d64c4ae2422536eeff5b00bd58b24df0ce9b163212cb8918c8e36f54b804

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      9d7eba7d03e758b765ac79128d92de1ce6e5549a6f00317aecf122108ca694fc

    • Size

      538KB

    • MD5

      5d4ccb23e6db806d72c6a46fb5c01187

    • SHA1

      b9b83778057133f04455cd251bd1aeb1e2054de9

    • SHA256

      9d7eba7d03e758b765ac79128d92de1ce6e5549a6f00317aecf122108ca694fc

    • SHA512

      d630f4155656b94a562a2c34e47c5cc74eb54c2ffb9ee5874052eef1ccc10c9fb637d64c4ae2422536eeff5b00bd58b24df0ce9b163212cb8918c8e36f54b804

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks