General

  • Target

    4736-142-0x00000000003E0000-0x00000000003F4000-memory.dmp

  • Size

    80KB

  • MD5

    7d7229d748f5c96a03a03cea5ea46236

  • SHA1

    7fe80595e8852a6a5b4ca330ead9c61424634abd

  • SHA256

    6ce5f82f891970e7a265f6656669ae43bd6658a9910a294243798eb61e713493

  • SHA512

    e26b6c1c4902998236206545175f51add80bab53ba87bed2cac8c905c14b1df310fa852d3b4b8f55d84b4f68a0fcd3b183551148038cd87bdfd894dbd89289e8

  • SSDEEP

    768:GZMX4lWTbgk+G0uauc7ZO66h8kFIHp1HSG6EqOdtEKiZeS6RkUhS:JX4lWTbMG55c7o8kFIHpEGa4eQRf

Malware Config

Extracted

Family

raccoon

Botnet

9b19cf60d9bdf65b8a2495aa965456c3

C2

http://5.2.70.65/

rc4.plain

Signatures

Files

  • 4736-142-0x00000000003E0000-0x00000000003F4000-memory.dmp
    .exe windows x86


    Headers

    Sections