General

  • Target

    892-201-0x0000000000550000-0x0000000000562000-memory.dmp

  • Size

    72KB

  • MD5

    37abceea6769dbc8d2ecfbb6649b9afd

  • SHA1

    2d1a33a6fbbd908bda8a7b184317673790cc879f

  • SHA256

    6e33eba5de49b969d3528737ba879fdddb89f42057b096f2c25b694fbf89a00c

  • SHA512

    4da21382e661b1613f51df851dadd86c979666741cc09a7a510c97e7cb9c9f4bff6431e568808c02d3a8489019a4fa45c22e695a086e8ee794745c5fb94bf449

  • SSDEEP

    1536:mYMEYOCI2l796QXJD5SgQpXWCdoZK4hEnXLTu4kO3U8zxJmIqIdYfN8U:mlEYOCI2b6QXJD5Svp9OhEXL7kOk8zxJ

Malware Config

Extracted

Family

raccoon

Botnet

d020f14a64593b123f5299012b4c811a

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 892-201-0x0000000000550000-0x0000000000562000-memory.dmp
    .exe windows x86


    Headers

    Sections