General

  • Target

    2304-35-0x0000000000400000-0x0000000000492000-memory.dmp

  • Size

    584KB

  • Sample

    240725-c6pe7atdnm

  • MD5

    d76f0963caef813ae6c537d06ef29569

  • SHA1

    b7e7a352f585c964dad9725ca22c8092627cdcfc

  • SHA256

    6b3be54729dc19a2621b0ba5baeff2e3cee360057faba2e2485b219b5e05efa1

  • SHA512

    48be26b6b6b65c25e747936401f72e475f2a0de86f4806a90d353696e653cdff8fd75583f06a2076224ea89bd34d05982b137b35c44ede2ddfad5da35bc17bff

  • SSDEEP

    12288:SkNNfKhb6z4fkvlhooipWjeWZCjyoRmCJmxLkuT+uIm3zsM0t6ERVk:bNNu6z4cvlhJigSWZSERSbk

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Targets

    • Target

      2304-35-0x0000000000400000-0x0000000000492000-memory.dmp

    • Size

      584KB

    • MD5

      d76f0963caef813ae6c537d06ef29569

    • SHA1

      b7e7a352f585c964dad9725ca22c8092627cdcfc

    • SHA256

      6b3be54729dc19a2621b0ba5baeff2e3cee360057faba2e2485b219b5e05efa1

    • SHA512

      48be26b6b6b65c25e747936401f72e475f2a0de86f4806a90d353696e653cdff8fd75583f06a2076224ea89bd34d05982b137b35c44ede2ddfad5da35bc17bff

    • SSDEEP

      12288:SkNNfKhb6z4fkvlhooipWjeWZCjyoRmCJmxLkuT+uIm3zsM0t6ERVk:bNNu6z4cvlhJigSWZSERSbk

    Score
    3/10

MITRE ATT&CK Matrix

Tasks