General

  • Target

    2000-56-0x0000000000400000-0x0000000000463000-memory.dmp

  • Size

    396KB

  • MD5

    94e90a8887a5523aa68df780debc73dc

  • SHA1

    0b5fbb0a8fed03550e02f9d5959a799dbc3c6186

  • SHA256

    06a03ef85ecf77042fa21e66dfacd7a73b9556b213519d62ca76b60f301657c5

  • SHA512

    88dc718ca6019c3345e44892401070e080ffb9033438c3ac59ed30afdc078d9826cc8d1fc796cf4c28fb6f86f347cf217ab808d50b0bcec391cf6c014dc5be4a

  • SSDEEP

    3072:QcjzCB6WfhK4IULps3K6RbSlCPiOE75K8c0ADH/7f43H7BFhiAIBRCDR1:i/UMLsKn6/7f4VRIj

Malware Config

Extracted

Family

raccoon

Botnet

960d8047e2829c4b87de991d706e2490

C2

http://45.15.156.209/

rc4.plain

Signatures

Files

  • 2000-56-0x0000000000400000-0x0000000000463000-memory.dmp
    .exe windows x86


    Headers

    Sections