General

  • Target

    468-64-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    6c93138e3ba559390a37e7f346be84b5

  • SHA1

    88ab0483520e98890a35ff08f10ff7a0423d28d5

  • SHA256

    a24500a8c8d39953b7ad200ef10fb192713b71c0ff433dab3a0c01fadbda045c

  • SHA512

    c082c23e7b8ff34ff042684731fc97ba85a67a6a0c790fe48e150a6d26c9417178bbf1c4cf39aeb53b233b1c72c7af27c76726f0a1ed9cae9774a0a8455fa0b8

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

bd3a3a503834ef8e836d8a99d1ecff54

C2

http://135.148.104.11/

rc4.plain

Signatures

Files

  • 468-64-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections