General

  • Target

    1120-56-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    9643807d4bb3c8c50b06419aac7884eb

  • SHA1

    6100127abcdb5f60d3acc806dc1809baa3d38bf8

  • SHA256

    fea290330fe211c6b791bd2fc25d1dd82c5b3f7c9683b21b6b43163fb2e1ec8e

  • SHA512

    0d0933e7d2c50b275a5702b0991aaf2467ec81c338e2227acfd1e11227d45ae83cb0bb884f20bfa00b8f1c275d5a79a900475b8109f33b5d2ce118f3b358556b

  • SSDEEP

    1536:IVp01Eca2z/LvhbUDZUN1T04K3rJJOFOE:j1EcfBUDZi03K

Malware Config

Extracted

Family

raccoon

Botnet

748bff7a2cf52d6d9225103df9623ab7

C2

http://89.208.104.165/

http://77.220.215.34/

http://77.220.215.14/

rc4.plain

Signatures

Files

  • 1120-56-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections