General

  • Target

    4644-134-0x0000000000400000-0x0000000002B7F000-memory.dmp

  • Size

    39.5MB

  • MD5

    7a9ab0bab491f0f6f8ce032f409f8f4e

  • SHA1

    50a8d081186df02219786ac6afe9fde7ba97a795

  • SHA256

    6deb59e76c9e510394ddf3bd564e82c405b61d7c502d7475e84797abe385cfed

  • SHA512

    6f753722356019e62dd9f1482a4d68c6d1b2625fe103072c6785d112678265c90daaa385e9f08d7b1a7d0d1da788d6d5729d91d982c64a3e4969f1d8ec405b46

  • SSDEEP

    3072:v1EMGexnGBPY18u5ciCO/nYfnRGIEBqD2Ms/84r+gU8H72Pj:v1nmQ1ieURGX+2/r

Malware Config

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Signatures

Files

  • 4644-134-0x0000000000400000-0x0000000002B7F000-memory.dmp
    .exe windows x86


    Headers

    Sections