General

  • Target

    4900-173-0x0000000000400000-0x0000000002B7E000-memory.dmp

  • Size

    39.5MB

  • MD5

    14278d9600102c060b8c96700404b125

  • SHA1

    9c94a384a38df66cbc4e0d729692c8fac6630bce

  • SHA256

    be3e96d6b518852ee414111473ef226717fde98ed4ea36ad95f710838407ad4f

  • SHA512

    9b1a0db9c29f634926ebffeb3ff44b8dcd2b0f1515814df0f35efc790d2195337810bf8342a81cf8caa594142383ba3cf8445465405d010d207f4d57f86480fd

  • SSDEEP

    3072:v1EMGexnGRY184GOgMXwBiELjHSp2MSeuri:v1n11c4QVPHBMB

Malware Config

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 4900-173-0x0000000000400000-0x0000000002B7E000-memory.dmp
    .exe windows x86


    Headers

    Sections