General

  • Target

    3408-148-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    2d0ccbe61d6fa56681d62d569f96832e

  • SHA1

    1187d61771dc33e5c47323834895bf311f1ebc41

  • SHA256

    5d2968cf7f2586117adf106296d2da77bbc4753de62f78797002bd451da2fda0

  • SHA512

    731d5110eaf9856b4d78ba44ebd3740a4becf6fd99dd8d6df56f1836e7381fa7b7edff29482e7673dc2a63ea8d798a88151173ba55119b135ac315f1f582514b

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

ff85621b9b7e77782fcfd9e75aa2a3e1

C2

http://80.85.139.245/

rc4.plain

Signatures

Files

  • 3408-148-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections