General

  • Target

    644-60-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    0f0733f24add37b774c20c202f8f9ca2

  • SHA1

    e563f27b50bb7e8066b2c9a4fa050f9e16276f6d

  • SHA256

    ea9a27b43d8ae7fb57104aef8fc9c861351df39e8cafa25f8baef7c4faca1267

  • SHA512

    c900cf38566649e5313daefeefd075902bc9959c604bb31560b703fa6ea00b08a1993307343a840528cc423239400e929b1fd063b1e18f582c981b9303a90b0f

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

b411699deaa52994b115ef42d0917fdd

C2

http://45.15.156.31/

rc4.plain

Signatures

Files

  • 644-60-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections