General

  • Target

    5d9e7a9e96e1c2f8310fd9b4198029b6ea0c63dd46a694eace7ca16e936b613e

  • Size

    792KB

  • Sample

    220228-knsznadge9

  • MD5

    b4011216084eaf2a16c12dad88665f34

  • SHA1

    4faec848c1defc1c4fee14110bc963336da9121b

  • SHA256

    5d9e7a9e96e1c2f8310fd9b4198029b6ea0c63dd46a694eace7ca16e936b613e

  • SHA512

    067154012aca5f68172f8ad1db239805e85c26bf566c0bf1c7dd6e85228b3d02d3ce86de4108377c89ce3a6df1f6d7f91d943c614340ab2c947ea1b3e8c5ccb8

Malware Config

Extracted

Family

raccoon

Botnet

1c0fad6805a0f65d7b597130eb9f089ffbe9857d

Attributes
  • url4cnc

    http://194.180.191.241/capibar

    http://103.155.93.35/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Targets

    • Target

      5d9e7a9e96e1c2f8310fd9b4198029b6ea0c63dd46a694eace7ca16e936b613e

    • Size

      792KB

    • MD5

      b4011216084eaf2a16c12dad88665f34

    • SHA1

      4faec848c1defc1c4fee14110bc963336da9121b

    • SHA256

      5d9e7a9e96e1c2f8310fd9b4198029b6ea0c63dd46a694eace7ca16e936b613e

    • SHA512

      067154012aca5f68172f8ad1db239805e85c26bf566c0bf1c7dd6e85228b3d02d3ce86de4108377c89ce3a6df1f6d7f91d943c614340ab2c947ea1b3e8c5ccb8

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks