General

  • Target

    3484-148-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    53fb672de92954b09171926bcbcd0106

  • SHA1

    7abd18454f70d0f058d6536593be7fc061fa165c

  • SHA256

    e2ae726881e75872f16294932c4c837b21bec2b8460c6bf10c246a4c913bfc99

  • SHA512

    642cd00008ffe9df285e974a02cd639a6712acb259968cec0d23ca9d6deca2d4bac46a9f75e3dfd6aa61570f4fced5965332d7f65724421f157a9438ee1bff9b

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

3f4a8564e5026a245d6974b020b3f6de

C2

http://45.15.156.225/

rc4.plain

Signatures

Files

  • 3484-148-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections