General

  • Target

    1304-62-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    6bd59abf40729d58c3dcb2e2bb58955a

  • SHA1

    1973a3943fbac084c7358685aedc3018b9043109

  • SHA256

    e095d29bfd8d302500ed3f9fafb287cbd7f258b958a79fc1385dc25485357fc6

  • SHA512

    6b3aadea4da3d3a0d2f14175a661ee7f0a1c9aaffb0c85235f40865f586b582fc98707e2df34664738fecb508ce69a14d2b58f2e624f41ae2c24d64db13dd17b

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

9b19cf60d9bdf65b8a2495aa965456c3

C2

http://94.131.107.206

rc4.plain

Signatures

Files

  • 1304-62-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections