General

  • Target

    360-67-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    9e7985885b3618df8354c91d2251679c

  • SHA1

    84e92f8123bf379262e1d7c9e6dfadeaf9a30c89

  • SHA256

    37a2b7c2456c7e59341ac9b17a76a20d511cfe3f5013d8e1eaee9da0d58a9f40

  • SHA512

    189682884bc3a8852e9bb428f2061da2564b2265f1a1848e4892bae891d190f2ac47b3a4e96c12c972188ec31347061a74423f3358c9d735f71cf39e0f4f9a19

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBl1:jky1EMd1KEWexDDRcpdUooIdYfN8

Malware Config

Extracted

Family

raccoon

Botnet

a828bce8fa315d5d5f4368b51eb63131

C2

http://144.76.31.117/

rc4.plain

Signatures

Files

  • 360-67-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections