General

  • Target

    1560-64-0x0000000000400000-0x0000000000414000-memory.dmp

  • Size

    80KB

  • MD5

    00733de64e6db3b6c3701fd4705667e6

  • SHA1

    cb155a688426c333ea46641b8fa4a1fe1e6802e2

  • SHA256

    6e24cd81798e623761a485fe0ecdb547c4af5a15054aca1513720af2334dd49c

  • SHA512

    3652eb0e7f25e032ca9195e82c2e6b21baccef67f49b282d57953c1ac9850ad806cfc2a1c644534e93ad1a5b3205941be9b0955b38df81f76cab82443b8d7983

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6RdUhS:AdMzAzjavO9uG+NNdQ4MGQRK

Malware Config

Extracted

Family

raccoon

Botnet

2fed969fd165f32f9d3d5171853ebef5

C2

http://64.44.135.91/

rc4.plain

Signatures

Files

  • 1560-64-0x0000000000400000-0x0000000000414000-memory.dmp
    .exe windows x86


    Headers

    Sections