General

  • Target

    1096-132-0x0000000000400000-0x0000000000DAF000-memory.dmp

  • Size

    9.7MB

  • MD5

    a897a73b6b9ff929373a27da7932ff35

  • SHA1

    430053f6350029e04ec6a3bf1d346bc3f04f3d04

  • SHA256

    aaf55882633e30a91aabf270ab8515d761812461c2d3ce61f87b2757d0237889

  • SHA512

    b1770cafe7ba8c7e8356b05c3334259e346c1dae879801dc521480ef0439cba302b8e811426862b45c92a6376ca77e2adfdc2771400e1631b1737669440a1042

  • SSDEEP

    196608:SGFs/MMudyFx/ewLn5CmD/cRu3LyA8OYtgd/bS/4jqJK7nmLAqq:SGFsCdeheqn4mq5KjS/ojnB

Malware Config

Extracted

Family

raccoon

Botnet

4ee4e2ee5aa36d394f5d44408a602375

C2

http://168.119.60.182/

rc4.plain

Signatures

Files

  • 1096-132-0x0000000000400000-0x0000000000DAF000-memory.dmp
    .exe windows x86


    Headers

    Sections