General

  • Target

    2956-57-0x0000000000400000-0x0000000000473000-memory.dmp

  • Size

    460KB

  • Sample

    230704-q8j55sdf82

  • MD5

    5794cb11355606fc84f72b0683a69414

  • SHA1

    87afb8dbd9a31ca1ca404b67c192369b588a6638

  • SHA256

    61ee8f84e57c8c382421712cea60a6988b8ae8af6b68cf9cc890ffe5401696da

  • SHA512

    8ff3d9b810ab9c3d54f1510e2f162b5dd4c988b74d0d707711bf70857c590cdf79637f78c7baa5e5a023b088424ea78797441619a3d32e3dad5ab80bf8587a04

  • SSDEEP

    3072:YypKuY4Ykrcd/ewCokL7h3lbrRvzB865Aac:YKKn4YEcdpCokfvhvzWa

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

xor.plain

Targets

    • Target

      2956-57-0x0000000000400000-0x0000000000473000-memory.dmp

    • Size

      460KB

    • MD5

      5794cb11355606fc84f72b0683a69414

    • SHA1

      87afb8dbd9a31ca1ca404b67c192369b588a6638

    • SHA256

      61ee8f84e57c8c382421712cea60a6988b8ae8af6b68cf9cc890ffe5401696da

    • SHA512

      8ff3d9b810ab9c3d54f1510e2f162b5dd4c988b74d0d707711bf70857c590cdf79637f78c7baa5e5a023b088424ea78797441619a3d32e3dad5ab80bf8587a04

    • SSDEEP

      3072:YypKuY4Ykrcd/ewCokL7h3lbrRvzB865Aac:YKKn4YEcdpCokfvhvzWa

    Score
    3/10

MITRE ATT&CK Matrix

Tasks