General

  • Target

    5479dc88bd6f5c3f7e1bda6b748991f1e8e3f202b4eb49493225a6a26cf41560

  • Size

    533KB

  • Sample

    211108-kgz5dsbeg4

  • MD5

    21e5032b68ad0ab16426e864c2b918b8

  • SHA1

    c5486acd81c2aaa2049fb27ec52e0b83ff128fb3

  • SHA256

    5479dc88bd6f5c3f7e1bda6b748991f1e8e3f202b4eb49493225a6a26cf41560

  • SHA512

    7e347f5a70a589eb98c58dab94f25942bf7f59295b8e38a5b59856179c543470d4b8fbec38051eaaa4cf5ed5fb72b028648e0d52ba4dca3fc3045e611eb77670

Malware Config

Extracted

Family

raccoon

Version

1.8.3

Botnet

243f5e3056753d9f9706258dce4f79e57c3a9c44

Attributes
  • url4cnc

    http://178.23.190.57/agrybirdsgamerept

    http://91.219.236.162/agrybirdsgamerept

    http://185.163.47.176/agrybirdsgamerept

    http://193.38.54.238/agrybirdsgamerept

    http://74.119.192.122/agrybirdsgamerept

    http://91.219.236.240/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      5479dc88bd6f5c3f7e1bda6b748991f1e8e3f202b4eb49493225a6a26cf41560

    • Size

      533KB

    • MD5

      21e5032b68ad0ab16426e864c2b918b8

    • SHA1

      c5486acd81c2aaa2049fb27ec52e0b83ff128fb3

    • SHA256

      5479dc88bd6f5c3f7e1bda6b748991f1e8e3f202b4eb49493225a6a26cf41560

    • SHA512

      7e347f5a70a589eb98c58dab94f25942bf7f59295b8e38a5b59856179c543470d4b8fbec38051eaaa4cf5ed5fb72b028648e0d52ba4dca3fc3045e611eb77670

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks