General

  • Target

    1008-214-0x00000000013D0000-0x00000000013E2000-memory.dmp

  • Size

    72KB

  • MD5

    0166a9b643483bb7b68831972f63b06b

  • SHA1

    a6587ae5fe9d818e78d75e69d6e40a7796b5d4d5

  • SHA256

    22e4c8216df5a04bae7cc68356c8e459af0302e8c89852c4bb910246ca0419ce

  • SHA512

    63e0a789643f4df274780dc06088de153068ea2ca45b7ecf23b0682efd6208ee05da2f96c2489f94ac2a31a5ef15d86cc325b0f416f2c7292a7a8312840e1e70

  • SSDEEP

    1536:K0axSVfSpYJg7vkUAf5kwmX2Yi2lf0IdYfN8L:/aPOy7vkbf5kwE2yPY18

Malware Config

Extracted

Family

raccoon

Botnet

d020f14a64593b123f5299012b4c811a

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 1008-214-0x00000000013D0000-0x00000000013E2000-memory.dmp
    .exe windows x86


    Headers

    Sections