General

  • Target

    696-168-0x0000000000710000-0x0000000000EAD000-memory.dmp

  • Size

    7.6MB

  • MD5

    6654cf7acc74b152bf8d2c53e648aa58

  • SHA1

    12422170c3c925d2f3d20e63e1d8d5b33395a75c

  • SHA256

    153eb7afb63001623c924aabccd8c1134af722d652af732d38984b95beab6e36

  • SHA512

    056a05a46a888f1769e2e0c40572359c3d4e30d1f24cb268f60a746988c7ca9b905c4b3a65403c565b32986a79ba176594c5b243d2e697989d1a3915d8b15905

  • SSDEEP

    98304:kFHkNx/nSCKXIvlJKAogzN/ESRNp6ADE8z9XU64frvRVZsSIC2w:kaN1TuIXKDgh8Sl6kXxIpTIe

Malware Config

Extracted

Family

raccoon

Botnet

1235b3a160961761ce8049994266cca8

C2

http://213.252.244.167/

rc4.plain

Signatures

Files

  • 696-168-0x0000000000710000-0x0000000000EAD000-memory.dmp
    .exe windows x86


    Headers

    Sections