General

  • Target

    19f727ec012f5f3f4273b6361145314cee365be990fb9f71330fd90b37107518

  • Size

    547KB

  • Sample

    211107-xbkhzaahb9

  • MD5

    50079a5a5a148046025d7b676d9154ef

  • SHA1

    adaa3dfa94fd2fc952d9002bbcc387bf395b73bc

  • SHA256

    19f727ec012f5f3f4273b6361145314cee365be990fb9f71330fd90b37107518

  • SHA512

    260474e7f7c9ae7487483a08728c44889a0f20a902ae2169185d6996e20688622a36a392e88b500b92bbca7206a6764016f4664f7980f191cd416dc8384a8f26

Malware Config

Extracted

Family

raccoon

Version

1.8.3

Botnet

243f5e3056753d9f9706258dce4f79e57c3a9c44

Attributes
  • url4cnc

    http://178.23.190.57/agrybirdsgamerept

    http://91.219.236.162/agrybirdsgamerept

    http://185.163.47.176/agrybirdsgamerept

    http://193.38.54.238/agrybirdsgamerept

    http://74.119.192.122/agrybirdsgamerept

    http://91.219.236.240/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      19f727ec012f5f3f4273b6361145314cee365be990fb9f71330fd90b37107518

    • Size

      547KB

    • MD5

      50079a5a5a148046025d7b676d9154ef

    • SHA1

      adaa3dfa94fd2fc952d9002bbcc387bf395b73bc

    • SHA256

      19f727ec012f5f3f4273b6361145314cee365be990fb9f71330fd90b37107518

    • SHA512

      260474e7f7c9ae7487483a08728c44889a0f20a902ae2169185d6996e20688622a36a392e88b500b92bbca7206a6764016f4664f7980f191cd416dc8384a8f26

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks