General

  • Target

    1128-56-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    101de913662d22789cb99d20b66e4763

  • SHA1

    40bcb89cc3e7e0c09675b4e156844f361a157681

  • SHA256

    2025b77c2181761e2764492ce3203553e884ea03b58a2f1cc440b8311dbd3bef

  • SHA512

    44ac08bfa627b58d9d62f8c39e3c5d420eddedd730314be7003a607ce373814b438f7c62aad8c2aac4759cc070a4bd68d8d3387cab7888d49a023eee1000e8bc

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

64b445f2d85b7aeb3d5c7b23112d6ac3

C2

http://45.15.156.209/

rc4.plain

Signatures

Files

  • 1128-56-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections