General

  • Target

    2000-58-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    2062abe6cb4de486da5fdb726fd9beb9

  • SHA1

    421951458a8e8e28893f5fbde091b91b5694da61

  • SHA256

    6f6a3ee711f1d0aaff6aa0f0cb75098f80a5057d5f28a54212e24fa72067e494

  • SHA512

    826efbaef3a43518aa20aedac09386714ec40e4abc74994e70f90a4d17534dddbf8d86418f4156f38e5809f1cc8ab1dd9c794bf850a3b6d0b31c7969fde6935b

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

fa82e734b53e841c19108ad18b73cc3a

C2

http://95.179.182.231/

rc4.plain

Signatures

Files

  • 2000-58-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections