General

  • Target

    1644-54-0x0000000000400000-0x0000000000DC4000-memory.dmp

  • Size

    9.8MB

  • MD5

    a009c2652880f95e197e9bad26af6e10

  • SHA1

    69eb167ee3c90492546b47e4f0b2a9fec6d9360c

  • SHA256

    c0218b80fe45502d0c7a262406243112e946c3e2884c88f8a4d698d2c59ee0b0

  • SHA512

    3386ef86f7b42e5368443f4689d24cfd5dc3430cf8eecc8f430876217e1acac1eefef45f44f1fcbe812370ee9a227d524e19a6bb28f557dddec3700829825b61

  • SSDEEP

    196608:1Sdqg8AiLgy9KTivyAkTORYqUatqaZIXtUjBixZnCn5:1Scf9LgywTivzkTORYHa8aZIUw3+5

Malware Config

Extracted

Family

raccoon

Botnet

f28f2d25a477bb5982a99746a8f3492c

C2

http://94.131.101.170/

rc4.plain

Signatures

Files

  • 1644-54-0x0000000000400000-0x0000000000DC4000-memory.dmp
    .exe windows x86


    Headers

    Sections