General

  • Target

    992-61-0x0000000000620000-0x0000000000634000-memory.dmp

  • Size

    80KB

  • MD5

    b7e2ae4099c692829bda7998514b0885

  • SHA1

    81c70444fb06b19ae3cf2a1e91a739d03773b80b

  • SHA256

    c170ea4d36a7e01321c077f062ee5d1d3fc2a5a99ed5ef514bf393b9560c1abb

  • SHA512

    3babc623f59e5247dbb96dcf0b3760669b491045202b220644629588f7a90cb38a462294d064b27844ae7b76b5ac9cf993473d4fee38417f13d67863c0873190

  • SSDEEP

    1536:JubQK3P3XX3KXDwM9vHEJVIgpjjCbbu6WwWQRG:JzK3P3XX3KXDpFkQgtjCZ

Malware Config

Extracted

Family

raccoon

Botnet

0b3b2a0f97b4af6132b2cc46c59f74ba

C2

http://194.87.216.7/

rc4.plain

Signatures

Files

  • 992-61-0x0000000000620000-0x0000000000634000-memory.dmp
    .exe windows x86


    Headers

    Sections