General

  • Target

    bfdad150533ea1b7ee22590ce922e65320235e41dd2c0a51ea684c52e4070faf

  • Size

    539KB

  • Sample

    211103-fejx6sdcc2

  • MD5

    763c41cb4ec84d570e16fd70e4201110

  • SHA1

    8c461c8db7e60bb1c41cad3e50f033899e65d848

  • SHA256

    bfdad150533ea1b7ee22590ce922e65320235e41dd2c0a51ea684c52e4070faf

  • SHA512

    3ea0da9da8bb5f9b36b70834cbffe9167e311936deb32689bd33f78c81790fa71ffc76e6165075c93a4aa9842f2d23d9e063fb64aa173e46cd657db10f761520

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      bfdad150533ea1b7ee22590ce922e65320235e41dd2c0a51ea684c52e4070faf

    • Size

      539KB

    • MD5

      763c41cb4ec84d570e16fd70e4201110

    • SHA1

      8c461c8db7e60bb1c41cad3e50f033899e65d848

    • SHA256

      bfdad150533ea1b7ee22590ce922e65320235e41dd2c0a51ea684c52e4070faf

    • SHA512

      3ea0da9da8bb5f9b36b70834cbffe9167e311936deb32689bd33f78c81790fa71ffc76e6165075c93a4aa9842f2d23d9e063fb64aa173e46cd657db10f761520

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks