General

  • Target

    e28a6d3bdcfdad9ff4c37e6c22c1a52018e5076ec65b128614bcf0e8eb711171_02510000.7z

  • Size

    242KB

  • Sample

    250327-esae8axshw

  • MD5

    0cdadf17d2a5a7b19ac445a2d66d6f6b

  • SHA1

    94cb3c7247a1eee62ec633e86e1e8e8787cb1a19

  • SHA256

    157729c0f840c6452979a121b855d372b28b1c46d41e225dee690fa5ce60ed1c

  • SHA512

    ed810a38dbf1332e9b3d6d3cf24fa4429b6e6485064107d44199aaefe9127c9c265f04e8e7907022786c60adecabfe0dbcdeb902d10cced4f28ed59be66a75f6

  • SSDEEP

    6144:Ok/HR2Oa3A1EykiFcHpbzYJZXM02m7mYMw1iOMJ7nBBvzbp07W:7Hja3DyFGJ3YJwArfyBBvzbpj

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      e28a6d3bdcfdad9ff4c37e6c22c1a52018e5076ec65b128614bcf0e8eb711171_02510000.bin

    • Size

      564KB

    • MD5

      101a628e6b32bff7e99db64bcb1438a3

    • SHA1

      e009162ca42071592d8c98a4ecf59bd2109261cb

    • SHA256

      63249d685d67cc6c2fbff9e469b7b7537f786c2fa1fc33634e28f73315a99d41

    • SHA512

      d7d7d2b5359f12c5183844be9131427c3ccb256c0aca9eb77f273e07ac1d01da6d0f8a73833236da71feef3ba5da775f82d2a4224d2d7b483e97f6674af0b317

    • SSDEEP

      12288:38Malpp/QPcqcGVwwAPfoEQB94Uc1VNzZWPx9YBK3Tdb:38dhQEqcGQfoxGVxIPAIjd

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks