General

  • Target

    1796-67-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    fe8a22add4aab376ef9e97d8d80e5fd9

  • SHA1

    0ad295474dedfaea66f0e7b017e84e58039dc26c

  • SHA256

    9644dd01148e63323ec13650f85c0129ace51254b78a4309c25c6cd764814765

  • SHA512

    77c10b10ac174e5ac728fec70b6b2965821795743a56e1afa791b9e04c8027ef25afe034b4f79e9a4eb2dd555da56871683dd7ba3ff529b05b691e7baceb5b8b

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBl9:jky1EMd1KEWexDDRcpdUooIdYfN8

Malware Config

Extracted

Family

raccoon

Botnet

01883f714c9f0cd036922beb89b7baf3

C2

http://77.73.133.49/

rc4.plain

Signatures

Files

  • 1796-67-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections