General

  • Target

    600-55-0x0000000000840000-0x0000000000F97000-memory.dmp

  • Size

    7.3MB

  • Sample

    220805-phpr9sacdq

  • MD5

    de5b23b649e2bbf037e971a775d6b9e0

  • SHA1

    17715f600de366de53f68999d0ae8341e43ca82c

  • SHA256

    48fe375476f91281f4ce711375d7076b34690802e72ccdae9ba39ff4f3c2813a

  • SHA512

    8e8211cb80c25f551d22f23d93c880d4624a159ccecf7c61cf2277acd4426dc2783b2be40859e1e3b17fdbc48a1f4f017e71367e50fc020155a0b9a268c989e9

Malware Config

Extracted

Family

raccoon

Botnet

517bb0d640c1242c3f069aab3d1018d6

C2

http://51.195.166.178/

rc4.plain

Targets

    • Target

      600-55-0x0000000000840000-0x0000000000F97000-memory.dmp

    • Size

      7.3MB

    • MD5

      de5b23b649e2bbf037e971a775d6b9e0

    • SHA1

      17715f600de366de53f68999d0ae8341e43ca82c

    • SHA256

      48fe375476f91281f4ce711375d7076b34690802e72ccdae9ba39ff4f3c2813a

    • SHA512

      8e8211cb80c25f551d22f23d93c880d4624a159ccecf7c61cf2277acd4426dc2783b2be40859e1e3b17fdbc48a1f4f017e71367e50fc020155a0b9a268c989e9

    Score
    1/10

MITRE ATT&CK Matrix

Tasks