General

  • Target

    1220-61-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    8a6f993d55c9fd881f8cde9e98d466ce

  • SHA1

    5cd00a7c43977f51684a3c6c0957e9cc43bb0e42

  • SHA256

    e443b6a9085164733c9cd130adc5ec0acc0199be2c7c8d452b16dfb785f5fcdb

  • SHA512

    9157f80a31bf54f9507f01e327787f88e3e59b1023763f79cecf5d9f9d91a2ff6972166dea3dd86de8bc771005f3b53f704513712ec20505c5f74a504a2813e8

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

bd3a3a503834ef8e836d8a99d1ecff54

C2

http://77.73.133.7/

rc4.plain

Signatures

Files

  • 1220-61-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections