General

  • Target

    524-67-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    d607d234c828c658e6eba60e511a1f4f

  • SHA1

    86744ccca0bb4748f47dfd41b0a48d460cde12ce

  • SHA256

    21873cbbb626e93df80901d67bebdfee8a113e7f59db0dd07830383a8c2aa2c5

  • SHA512

    45f2c7c2803f3673ee749a9d525f84ab55a7ba0f988bc5c0a6f6d8763d82316ccf4910a98b8605c966e40318be298cdf30fc453118d935dee2e21252e51061a7

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6R:AdMzAzjavO9uG+NNdQ4MGQR

Malware Config

Extracted

Family

raccoon

Botnet

32d6569d92c418f722d39445b20ede9b

C2

http://94.131.109.53/

http://188.119.112.157/

http://94.131.107.229/

rc4.plain

Signatures

Files

  • 524-67-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections