General

  • Target

    bf5ba4ab18a2af400c738295bee87eb200bdf10f9f2ecba49d7fa477d952c67b

  • Size

    1.6MB

  • Sample

    220512-nxb92sdbg3

  • MD5

    8bab62e8bc62a0040707e05735e96ce6

  • SHA1

    b7381f5e7ffdb1a7d8d6d1a233b49132f5e2d6ae

  • SHA256

    bf5ba4ab18a2af400c738295bee87eb200bdf10f9f2ecba49d7fa477d952c67b

  • SHA512

    17b2631abcd284046ccc00b4ef7f1870c93fb6889381d6b653b78aa07a8bb93f9c2c5a41aed8b69d5d7c0cfc95c3f82d9202499988d24e69b0a2118fb430ac65

Malware Config

Extracted

Family

raccoon

Botnet

b92a235bffa69e2c5cbe1e5e08c8f58c785cae24

Attributes
  • url4cnc

    https://telete.in/jrubixred

rc4.plain
rc4.plain

Targets

    • Target

      bf5ba4ab18a2af400c738295bee87eb200bdf10f9f2ecba49d7fa477d952c67b

    • Size

      1.6MB

    • MD5

      8bab62e8bc62a0040707e05735e96ce6

    • SHA1

      b7381f5e7ffdb1a7d8d6d1a233b49132f5e2d6ae

    • SHA256

      bf5ba4ab18a2af400c738295bee87eb200bdf10f9f2ecba49d7fa477d952c67b

    • SHA512

      17b2631abcd284046ccc00b4ef7f1870c93fb6889381d6b653b78aa07a8bb93f9c2c5a41aed8b69d5d7c0cfc95c3f82d9202499988d24e69b0a2118fb430ac65

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks