General

  • Target

    216-199-0x0000000000EB0000-0x0000000000EC4000-memory.dmp

  • Size

    80KB

  • MD5

    8e0c9475b6838b12539672a3be2401c6

  • SHA1

    1410778fae130db04ee3b155a09a36486240a184

  • SHA256

    987c4315ecf1356447bdaa062ec30595f58de840544d8c4508caaadd885050e5

  • SHA512

    d6352c0eec30305bc43a02c1cd3398be101732b035e8928e5a83ec3df9656f3cc459d951f01c97f934441e839899d504910ee594ff35f74625e2da88badf36f2

  • SSDEEP

    768:GT4Tt7uYYAloYMTMHgH0CObD/MDatRBfW5Fsh6EZsj8entZeS6RHUhS:vTt7UGsH0CObeatRBkshpbenzQR0

Malware Config

Extracted

Family

raccoon

Botnet

7394a7fc5da9794209d8b0503ca4abf4

C2

http://213.252.245.214

rc4.plain

Signatures

Files

  • 216-199-0x0000000000EB0000-0x0000000000EC4000-memory.dmp
    .exe windows x86


    Headers

    Sections