General

  • Target

    1284-63-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    5731abd879eb54777c5992a14be5e6a1

  • SHA1

    fa9e850a6d2adb2fce1ce94e2795904a74e0ace1

  • SHA256

    d118cdced10b67ad911d5c62886c008ff94e67d800b0c50d2c2a3ec4cdbe3c6e

  • SHA512

    89b272397125597af40140132b359131fbedc07da6448a6d0d74724d44d47aee2880fbee61d7783f2cb1d40d4193396db5933b76411a9cfe9c4e3ab3b4c688ff

  • SSDEEP

    768:BfOKi+7erib7i6DcJKUU1HTbqHymKYGkXFnGeAwb2cDMaTji5w4AfY1WABS9MZmT:1ev2XW8x91WSSI15rJCvUnGlJworD

Malware Config

Extracted

Family

raccoon

Botnet

94476028cb01373a9a79593d7fce091e

C2

http://194.180.174.117

http://194.180.191.81

rc4.plain

Signatures

Files

  • 1284-63-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections