General

  • Target

    1688-165-0x0000000000400000-0x00000000007EE000-memory.dmp

  • Size

    3.9MB

  • MD5

    0872adc26f8835bd63bc8f8f1b70e8a8

  • SHA1

    0e331a01b5c64ba91d2ce58c535767dc41064668

  • SHA256

    556a5252bccce4e0259b8e287e0e115faf1474941710a4af9487b6432a3c98db

  • SHA512

    6267465f905b5904dbd27e5a0377578b51d30acbfa7d683f6d50a70bb11a216c75e980c1a0fa414ea7f84f63ce0731e304a28d5676d72ffce602a69dc5e31e94

  • SSDEEP

    6144:v1nj1dR0t/6eQm+Q2EScZAtZeD1NTph7bnxHE6f4:tnjzR8/RQm+QPScZh1797FE6

Malware Config

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 1688-165-0x0000000000400000-0x00000000007EE000-memory.dmp
    .exe windows x86


    Headers

    Sections