General

  • Target

    2020-62-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    9ab7c13c34cdfa6a1e64c4cd35bb06be

  • SHA1

    69141a35dfce38285e9783965e371b080b5b920b

  • SHA256

    95cfb626b829bbf788f949263bf7eaf7e24a4a12c562c9b03a0f55c5409b7a4e

  • SHA512

    23a8bba58ee8d856132798eb815e8850b35c04ae2ad2446260e67a7eed3d3e4a4e00f625d0fb60a04d6ad0e43d0a7331c3f0ed6f508adf1bc31390352e88b1bb

  • SSDEEP

    1536:IVp01Eca2z/LvhbUDZUN1T04K3rJJOFOE:j1EcfBUDZi03K

Malware Config

Extracted

Family

raccoon

Botnet

fa4cf534e5f7381e004eab45f30fb1cc

C2

http://88.119.174.162/

rc4.plain

Signatures

Files

  • 2020-62-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections