General

  • Target

    2728-169-0x0000000000620000-0x0000000000DBD000-memory.dmp

  • Size

    7.6MB

  • MD5

    7abb7c0c7b0f3afb51f5033bca0c31d3

  • SHA1

    6d671eba86523694529fd9d65a2877b2434b5715

  • SHA256

    af8627f603d2950f37718ade75718a73ff9210f277866a746337d1c52b28d5d1

  • SHA512

    9eb9b91cc0fa8bfead2b3edb2c7fac856b66d8fed4a3ed805f345c72d274d85f19f8561373dac88ae5b0a6095fb642cf4c155d76f6d2e7b8fbcab036a6db8bf2

  • SSDEEP

    98304:/HkQx/gSCKXRv5JKXgzN/ESINp6ADE8z9XU64frvRVZsSICcw:cQWTuRLKXgh8S+6kXxIpTI8

Malware Config

Extracted

Family

raccoon

Botnet

1235b3a160961761ce8049994266cca8

C2

http://213.252.244.167/

rc4.plain

Signatures

Files

  • 2728-169-0x0000000000620000-0x0000000000DBD000-memory.dmp
    .exe windows x86


    Headers

    Sections