General

  • Target

    a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417

  • Size

    720KB

  • Sample

    220524-svzpsabegn

  • MD5

    46fe30d98adbf89c395574c7db5f798e

  • SHA1

    91bb342409f7e90992945b80c48189a5a1c0a162

  • SHA256

    a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417

  • SHA512

    de61df6961728ffa138727ee2301083d2a4511fd96f0d425e3e9891d962af1923a6efd1fec153ec93388fadd7f547d8279436f6a935252760b419bfa4431e955

Malware Config

Extracted

Family

raccoon

Botnet

e5c7c06415dbd337f69c6c4ad51ec91ed9c82ab2

Attributes
  • url4cnc

    https://telete.in/bgangster1

rc4.plain
rc4.plain

Targets

    • Target

      a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417

    • Size

      720KB

    • MD5

      46fe30d98adbf89c395574c7db5f798e

    • SHA1

      91bb342409f7e90992945b80c48189a5a1c0a162

    • SHA256

      a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417

    • SHA512

      de61df6961728ffa138727ee2301083d2a4511fd96f0d425e3e9891d962af1923a6efd1fec153ec93388fadd7f547d8279436f6a935252760b419bfa4431e955

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Raccoon Stealer Payload

    • CoreCCC Packer

      Detects CoreCCC packer used to load .NET malware.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks