General

  • Target

    1332-61-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    581b9a9cd85377bbbf4c30a638261458

  • SHA1

    a802d7607396767214c6b306c860b1509fb62f44

  • SHA256

    ddbc1c84f4ed9fcfda5a7ffb54277af7729716e8bf32a5b85e120463737be1cc

  • SHA512

    79085e9b8d52540dea430b8e57cef48942ab962e0184458fb7ce5695b6a9518add242fd745677b9fceaecacfe50c4a2ab7648b1c8b52b80e1bab0f466385e4aa

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

0ca28e482be111f26f863ee51909f00a

C2

http://45.153.240.247/

rc4.plain

Signatures

Files

  • 1332-61-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections