General

  • Target

    1320-65-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    a593145eb7746e94ccb02521d1dd41b3

  • SHA1

    314cc501751fd0b7ceae17be332d253844e93d21

  • SHA256

    12a1feced9b53fa64bb153442d39b37877601154f71a396952e99119d77273eb

  • SHA512

    00653351c6ae093b71358320e538153ff00d09bc7864c516345137d36783f517b55b97bcbdac43719532b8423dcd6a816c13570591d1262c507e35eb2720dd37

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

cabcf15ea37a24b58186813d42a6971f

C2

http://83.217.11.16/

rc4.plain

Signatures

Files

  • 1320-65-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections