General

  • Target

    1680-57-0x0000000000400000-0x00000000007EA000-memory.dmp

  • Size

    3.9MB

  • MD5

    006ad05bdd5000d58621b50e0c74bc17

  • SHA1

    266730c902c0d18151d40a5435031e416614d1b4

  • SHA256

    8b3599f9f04a2a2183315b16c037bbb8b8033ca574663ddc5674c1f7557b78a4

  • SHA512

    9ea40c4837f8b8a0d7b79926abca4cd29ee96bf2d1c465f10e47a1bc181a41b7f4a96912ceed586896b421f43cafaa067d9c9bcc91c3331f2afa8b548b852363

  • SSDEEP

    6144:v1nd1qxbPgY9IBc56SpNTIuqbqHwFIEyJ1:tndQTh6Bc56SpNTIuxQ7y

Malware Config

Extracted

Family

raccoon

Botnet

29436d51b3a8fde5d7895ccc63af3a09

C2

http://88.119.161.156

rc4.plain

Signatures

Files

  • 1680-57-0x0000000000400000-0x00000000007EA000-memory.dmp
    .exe windows x86


    Headers

    Sections