General

  • Target

    896-54-0x0000000000400000-0x0000000000E4C000-memory.dmp

  • Size

    10.3MB

  • MD5

    aaeb832d52ec312a73b2e43cd704157f

  • SHA1

    2f686007f0be916f07f9bdf3cac2c3ec4c2ee458

  • SHA256

    0d64e02ad4c2045acdd4bc9d88ec18cdc42d8e4a232f170cbcc71f02d1595c98

  • SHA512

    27862ce9ebbc2394121871f31f2b8aec42b0b7a1bd949c6e3245bd390095b5204ed119e508cce364770be82745cd270eb55cef5aca016f61083dd7d23808e9c5

  • SSDEEP

    196608:K22bcPHp/IC+Yyc6cpkBrA/kKfGv5FtWtPhWlzuOO/oox4jTqlIPPGSccxm:K2wcfpQC+Y5CBMLejt2pyBoxkTqlIHd8

Malware Config

Extracted

Family

raccoon

Botnet

a62538de9998ac237e5f0e43dd271a27

C2

http://84.246.85.178/

rc4.plain

Signatures

Files

  • 896-54-0x0000000000400000-0x0000000000E4C000-memory.dmp
    .exe windows x86


    Headers

    Sections