General

  • Target

    1900-103-0x0000000000400000-0x0000000000E21000-memory.dmp

  • Size

    10.1MB

  • MD5

    e690ea71231c6ef7787d73d0489a28d3

  • SHA1

    3365327edcc7de1d63ba3bdf290afd764379ec63

  • SHA256

    89f67563aae97bb5fc6b08bd167110c0ec3bd1223db767c4d5918bbef3333577

  • SHA512

    7d40c88aafdbbbec85c2ac9a5e5ee17ea44fe7b217fe9834f409d94e54e31f6dc45722dfee37b5b67207ce71dc1c484dcafd4881c694e29fcb49ef09e9708b0d

  • SSDEEP

    196608:KbGDPRa5037Gm/vJW0LcGkJOo36KhbbRT3Z7/OXnKO8/tPp0ll9z3d0dppIbh5:KDG37Gm/3LybjbDmXl60bz

Malware Config

Extracted

Family

raccoon

Botnet

ad82482251879b6e89002f532531462a

C2

http://89.185.85.53/

rc4.plain

Signatures

Files

  • 1900-103-0x0000000000400000-0x0000000000E21000-memory.dmp
    .exe windows x86


    Headers

    Sections