General

  • Target

    98136-148-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    3a8945c3b4357d38ce2a7666d7974f41

  • SHA1

    738dedb913512c12f68510a34cd6c955dec89275

  • SHA256

    50aa5b41660f71613cca55ae8fba9d642856567d6def5da6fa0c0a4de0b4dbf0

  • SHA512

    370ee148f498361257dbadc06b56eca0d91992f80d8633587b534751079a63090ecb6d04b3a427cac7e0199b83d9b4d16575a83230dd6bcb3bb5adc547af36b8

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6ReUhS:AdMzAzjavO9uG+NNdQ4MGQRh

Malware Config

Extracted

Family

raccoon

Botnet

700839d516cc3c21c6963dd195db3d5c

C2

http://111.90.149.168/

rc4.plain

Signatures

Files

  • 98136-148-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections