General

  • Target

    1432-178-0x0000000000400000-0x000000000042B000-memory.dmp

  • Size

    172KB

  • MD5

    040ea1673cf6b5f57a140967926cf63f

  • SHA1

    8d3a790d79ec7ed1f941f7ad80aee7c51b06e042

  • SHA256

    5aa2f801b7f69f0e85f1ca719686caa12065a76d4b7cb39bb6738ed48b2dbcc9

  • SHA512

    5ab596f7edeede1ced27cc96aeed364e1e88d8a0a36dcd0d1c23dbe5c5ca72d70e037ab4758bd9a0e8dc0c96540987456899af60a153dcea270d3d3e46da866c

  • SSDEEP

    3072:y1EMGexnGZY18DZ8ibKvYEYeDDDDDDDDDN0YtohDNv:y1nF1iSRVDDDDDDDDDhtohp

Malware Config

Extracted

Family

raccoon

Botnet

ec7a54fb6492ff3a52d09504b8ecf082

C2

http://88.119.161.188

http://88.119.161.19

rc4.plain

Signatures

Files

  • 1432-178-0x0000000000400000-0x000000000042B000-memory.dmp
    .exe windows x86


    Headers

    Sections