General

  • Target

    828-130-0x0000000000400000-0x0000000000E21000-memory.dmp

  • Size

    10.1MB

  • MD5

    9e5cb83ac2a417a1f3578885ac4b2595

  • SHA1

    271e32c625d7ebc68524ff05f435d0b4b6d076f1

  • SHA256

    52ddfd461092727b122869a3baf6469e3c402d985505978dfa6c9aceab283cbe

  • SHA512

    e0b3fb2ef1b2eb9e0c888e62057259120622266494c9683794e12c595eac7bd93d19c1cb40671dac1fab472a1f03e712663dcd291359bb6c2faa503b45bf1ead

  • SSDEEP

    196608:q+GDPRa5037Gm/vJW0LcGkuOo36KhbbRT3Z7/OXnKO8/tPp0ll9z3d0dppIbh5:qqG37Gm/3LyUjbDmXl60bz

Malware Config

Extracted

Family

raccoon

Botnet

ad82482251879b6e89002f532531462a

C2

http://89.185.85.53/

rc4.plain

Signatures

Files

  • 828-130-0x0000000000400000-0x0000000000E21000-memory.dmp
    .exe windows x86


    Headers

    Sections