General

  • Target

    1892-67-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    99f2cebc1d25c46b6567274072391fa1

  • SHA1

    9649e5005febbc17dd6b7feb3f01aa40c2ef7d03

  • SHA256

    4e97bf44e6f0922e62c691ce442d333e3a02d84902cfbfc8da0a2bab757aa5b8

  • SHA512

    97a256e1a7f6e1a8eddda58aa7f3882733174596c95ce335bee7d89f1416628a40605a4db78c5c0d59546c5c14ab494a072d7d9bebde5f91bc557ca81524a22b

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBlm:jky1EMd1KEWexDDRcpdUooIdYfN81

Malware Config

Extracted

Family

raccoon

Botnet

ac889a6276406442f3c625ca576ad771

C2

http://172.111.36.191/

rc4.plain

Signatures

Files

  • 1892-67-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections