General

  • Target

    1184-202-0x00000000003E0000-0x00000000003F2000-memory.dmp

  • Size

    72KB

  • MD5

    5fcab1aef32eebc79641ab0c21fbd580

  • SHA1

    412c4bfe5ce0b75344df4c3eb9866db58446acb5

  • SHA256

    0e69904df4370647b1d00f4e1429e3e64f10461637d9b35d1e6cbfb2293ae825

  • SHA512

    03dc54c72d5cd65c7d67bc60c4732afed367dacff8d98ec3c557c25e6f9ab528cdb36f68ce83496b4f9ac82e37628dac3bb5b90dee09dfe516469f87bc3a86b2

  • SSDEEP

    768:86sxx8tH9wuQO393+yZh0m8j/k8oI4+c47LjeQf1ES9xAHYgZeSGj5YW6NuDmACy:zu49oI39hTv8oI4LsPeQBxrYIdYfN8j

Malware Config

Extracted

Family

raccoon

Botnet

d020f14a64593b123f5299012b4c811a

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 1184-202-0x00000000003E0000-0x00000000003F2000-memory.dmp
    .exe windows x86


    Headers

    Sections