General

  • Target

    11edfb0ee9446aeebf3ce131cfdd77301a5d9e2fcba1a23e82edd2af3b2536d3

  • Size

    539KB

  • Sample

    211103-jcf1aadch8

  • MD5

    d59f6631d7bfd89e07644c0a920a41e4

  • SHA1

    a55074add14367509b81c7b7e2a5cd5af0f7ec0f

  • SHA256

    11edfb0ee9446aeebf3ce131cfdd77301a5d9e2fcba1a23e82edd2af3b2536d3

  • SHA512

    2c0cdf781184f7fe849355c941cb5023984b2335336897f4ecdbdd3e30970baa7a7554637b80840bf37807a71f5b8761863f5d5f83e0a1dbe740ea73bb7094c4

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      11edfb0ee9446aeebf3ce131cfdd77301a5d9e2fcba1a23e82edd2af3b2536d3

    • Size

      539KB

    • MD5

      d59f6631d7bfd89e07644c0a920a41e4

    • SHA1

      a55074add14367509b81c7b7e2a5cd5af0f7ec0f

    • SHA256

      11edfb0ee9446aeebf3ce131cfdd77301a5d9e2fcba1a23e82edd2af3b2536d3

    • SHA512

      2c0cdf781184f7fe849355c941cb5023984b2335336897f4ecdbdd3e30970baa7a7554637b80840bf37807a71f5b8761863f5d5f83e0a1dbe740ea73bb7094c4

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks