General

  • Target

    1648-103-0x0000000000A30000-0x00000000011DF000-memory.dmp

  • Size

    7.7MB

  • MD5

    fbd8128450e0d70887601ce249bdc3ed

  • SHA1

    4a4c0276120b2c72e924977a1ff68a6899a41a21

  • SHA256

    6840583b926e0fea7c09f243121d65b07514dd714a79e0c6c510c710fd283f87

  • SHA512

    f19fc286422d3fc2b4583ba64d4528206fa970b0d0716bc703fc3b3cc52522da64b31f69899f3795ac869b63478f7fd2cbb777faae170eaf04369a7c11355271

  • SSDEEP

    98304:GNSRQX9j687ycklr55CQgJrQXnwElVaIWx4sCvu3S7e:GqlrLzX1KVx4s2u3p

Malware Config

Extracted

Family

raccoon

Botnet

3eb898957657df9f0625e29daa9c1704

C2

http://89.185.85.53/

rc4.plain

Signatures

Files

  • 1648-103-0x0000000000A30000-0x00000000011DF000-memory.dmp
    .exe windows x86


    Headers

    Sections