General

  • Target

    98528-56-0x0000000000090000-0x00000000000A4000-memory.dmp

  • Size

    80KB

  • MD5

    73e8ea885263262164ddb0f9c9dcb269

  • SHA1

    fd8b72673161be6e1e911c554064873879419ea4

  • SHA256

    004194fab3e88954940cf53f7d21142b70c96ee5373984db03dfbe70d062175a

  • SHA512

    2de58b5e9019205b36d57ef2e333f80b995d1c9325461fa95ec1da2c753034096039d34ba33396857245f9b88343d9d4c41e2f493900d1c32cae84e177184fff

  • SSDEEP

    768:6UoyWI0N6YQJ4J1fUSCWP6a/b4YYIdPCEns5eMrZ3GZeS6Rw/UhS:e1NIeVIWd/b4YYIdP00iiQRws

Malware Config

Extracted

Family

raccoon

Botnet

f92e9c801dd5519dec68854186f5e626

C2

http://167.235.133.31/

rc4.plain

Signatures

Files

  • 98528-56-0x0000000000090000-0x00000000000A4000-memory.dmp
    .exe windows x86


    Headers

    Sections