General

  • Target

    4768-173-0x0000000000400000-0x00000000007EE000-memory.dmp

  • Size

    3.9MB

  • MD5

    13c88e382abe0ceef80ed74715f5ac83

  • SHA1

    e4b729b93fbc1ebe7e3ebbe4d43368036b73a012

  • SHA256

    459098bc78f73ab75de8a3674692d8e28782bc4530564e9625677070c9eb0a0b

  • SHA512

    47a51d324ba2561a427ab0511e518de55720b2549326cd7c25dada6db47a9ce40a2e3c43c4b365a532e1391f21e5e513f291085c726a3ccc16750b72c4b742e8

  • SSDEEP

    6144:v1nP1FR0t/6eQm+Q2EScZAtZeD1NTph7bnxHE6f4:tnPjR8/RQm+QPScZh1797FE6

Malware Config

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 4768-173-0x0000000000400000-0x00000000007EE000-memory.dmp
    .exe windows x86


    Headers

    Sections