General

  • Target

    948-62-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    94e77d1fa134ab9b7fa52cc2cbaf39d1

  • SHA1

    95d935c03287a10df3b96d1b93a4c1ee2a4dc185

  • SHA256

    049064135f190f337b24b8e62f00d4fb13fcf119b448ec493ce2e70116283702

  • SHA512

    9ea35608b3eb1bc98ab96696f6c222a4e186d5595da2e8ad974576988185147d315f5e4961920f329e24b47b210dcfcb9bc8b976a0280934e27a69fd232e8de3

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBlk:jky1EMd1KEWexDDRcpdUooIdYfN8t

Malware Config

Extracted

Family

raccoon

Botnet

07d468da7e028431301ff9d78ba706e1

C2

http://88.119.161.159/

rc4.plain

Signatures

Files

  • 948-62-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections