General

  • Target

    be8c2f7d5a2de9d1243bd54310fbe57e9c5ab0046da244c1233c9d01cc6f5a50

  • Size

    539KB

  • Sample

    211103-g127baadep

  • MD5

    361c9eee32b048291c472e1766a28ca7

  • SHA1

    3633a31377ff68354a14da74a9a88c2bbdba3d1b

  • SHA256

    be8c2f7d5a2de9d1243bd54310fbe57e9c5ab0046da244c1233c9d01cc6f5a50

  • SHA512

    a92a5a878f972e964294283bc9d311a340ac34f425da58d3ac077f4f435506073a7f1aea988df04c5fc33437622305d963fe94a6dffb6dc0b5061d6dcefe41bd

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      be8c2f7d5a2de9d1243bd54310fbe57e9c5ab0046da244c1233c9d01cc6f5a50

    • Size

      539KB

    • MD5

      361c9eee32b048291c472e1766a28ca7

    • SHA1

      3633a31377ff68354a14da74a9a88c2bbdba3d1b

    • SHA256

      be8c2f7d5a2de9d1243bd54310fbe57e9c5ab0046da244c1233c9d01cc6f5a50

    • SHA512

      a92a5a878f972e964294283bc9d311a340ac34f425da58d3ac077f4f435506073a7f1aea988df04c5fc33437622305d963fe94a6dffb6dc0b5061d6dcefe41bd

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks