General

  • Target

    4252-205-0x0000000002D70000-0x0000000002D82000-memory.dmp

  • Size

    72KB

  • MD5

    fed2cc0682f15e48a50a49e59ef6687e

  • SHA1

    3bc270418981496ce5b1e7c910f55641fa916395

  • SHA256

    48e85d164f5f9669293eb00f6767f7e146ff5f73d80eb1ce29eed78b4f72d673

  • SHA512

    70432fc290b5d4e9a323829532012240b49cc9d87909dd6c37ccca9b1c3e0163867af5fbf8027dbead4f7d9bf7b75208573fffe1c6fe87cb93fda330f851cb32

  • SSDEEP

    768:8SSAxsYiUzNbFk9xerloxmw8HFdocQ5nmklvOhLTtbjsnEl7HubeYZeSGj5YW6ND:rTdPOxerC5Wbot5hOhvxs4XwIdYfN8g

Malware Config

Extracted

Family

raccoon

Botnet

d020f14a64593b123f5299012b4c811a

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 4252-205-0x0000000002D70000-0x0000000002D82000-memory.dmp
    .exe windows x86


    Headers

    Sections