General

  • Target

    1668-63-0x0000000000400000-0x0000000000DD3000-memory.dmp

  • Size

    9.8MB

  • MD5

    ed4f54594d551b296945e41d59858ffb

  • SHA1

    487017ea599a12537160ccdbe126ad5c4364e049

  • SHA256

    c92e6a427632fba704d61bb05967dec8af26bdf67cbe40cb5058c34ef1dbd2c4

  • SHA512

    c3cb27fdb72f705e53fdf94bd6de1273b064181e0d43474662630e3be80298a7728b3e95840fdf8164fef6ae1d6c15741679e9bff330635f5d316e32e6e1aa5e

  • SSDEEP

    196608:xiAYSsdMbIGnicINb5ORPsYziillCXXvROvmLxb1JV9Sh+MMK5N/md:xB9sSnicINV2PsYzrllCXXvR5FjV4LM7

Malware Config

Extracted

Family

raccoon

Botnet

80cbdb8d66d1a00e163a1094a224c8cf

C2

http://89.185.85.53/

rc4.plain

Signatures

Files

  • 1668-63-0x0000000000400000-0x0000000000DD3000-memory.dmp
    .exe windows x86


    Headers

    Sections