General

  • Target

    1520-56-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    1ea6542c9b1ef07c8f28f7bf1eac7710

  • SHA1

    99d09727aaaf09fb4b1cf23902fd9f5a02f6ebf3

  • SHA256

    462394671203237fdb33c87c1596b379f2f13cf873e0ca25b23f2b33cf86b924

  • SHA512

    2113567c5ff32b44a338605f669f8a21f1592ed9ff5a586eae52af48b677a9c8af5e6d2a363ceec00a654047e42e163ea048a77ab0b605bb3f41b7093dfc2395

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBl0:jky1EMd1KEWexDDRcpdUooIdYfN8n

Malware Config

Extracted

Family

raccoon

Botnet

e734a12bc6119609a0b6a8bee6270055

C2

http://89.185.85.53/

rc4.plain

Signatures

Files

  • 1520-56-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections