General

  • Target

    1424-64-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    7306e4d8428be2533eca245dab270087

  • SHA1

    adf9455be7b2c30bdf7c0b4b2cb7e5132c1c9b68

  • SHA256

    c600b9c9d0d3d52bf53787761aab79cfc0cc8a1c3b4fa315480290d3d9428d0c

  • SHA512

    94b43528338d18405692333b0369ee1e125b45b83b7f0674087074d18f69fa3c95985cc3504ac76d6e870a60099ec637b743adefbd1f2853b1f83b0fbeebedf7

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R6UhS:AdMzAzjavO9uG+NNdQ4MGQRt

Malware Config

Extracted

Family

raccoon

Botnet

9b19cf60d9bdf65b8a2495aa965456c3

C2

http://5.2.70.65/

rc4.plain

Signatures

Files

  • 1424-64-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections