General

  • Target

    1624-168-0x0000000000EC0000-0x000000000165D000-memory.dmp

  • Size

    7.6MB

  • MD5

    e27d1d76335128514b0e479005a1176d

  • SHA1

    6284b898eee71d41ee4f64e3ba541c42c4c0ad56

  • SHA256

    a6acfe0f9dff6403cf14ffb1ec45bcaab127197ac0682e3cfb384ca20c324b4e

  • SHA512

    64c484857e83689706c54cef3d29936b9b443d56c3d7b5fa03a902d444f78cf48fded75ec3b57d1cc5682401af481bca900bdfea67670d832480cda66156dd46

  • SSDEEP

    98304:EHkwx/eSCKXuvZJKNgzN/ESsNp6ADE8z9XU64frvRVZsSIC0w:5w4Tuu7KNgh8SC6kXxIpTIY

Malware Config

Extracted

Family

raccoon

Botnet

1235b3a160961761ce8049994266cca8

C2

http://213.252.244.167/

rc4.plain

Signatures

Files

  • 1624-168-0x0000000000EC0000-0x000000000165D000-memory.dmp
    .exe windows x86


    Headers

    Sections