General

  • Target

    1936-68-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    c77136592ffc7b1345b323ff40d49dfe

  • SHA1

    0a0b3c0c73e7a6e379b6dd693e390b1bdab1ea58

  • SHA256

    797ed263bd7b5e0b001542f8289b97687020193438fdbbd5f9373c330152670b

  • SHA512

    66ebc8224b31c4401f078f11f617247876336a31c6118cf58cab1a188224415b3bc2c21b9a77ef0e3d91d92890d7248fed9fffa766bcff7ef576c09e414d3f5c

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

b07adb2a94b000b2ac4cd81c5d64d3a0

C2

http://45.15.156.36/

rc4.plain

Signatures

Files

  • 1936-68-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections