General

  • Target

    2568-137-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    0981708d16b110eb09f64f5347c3220f

  • SHA1

    427192df1c35723d4865a5a5aa0d039207f39ce2

  • SHA256

    9292a083c78891cf15a88283d5b2256a73a271fe746c3778c1c5b54d85e15da0

  • SHA512

    b92f1120d61004040706341d78b8b82bfabe64e7df22422f8eb52f21bcde82771a65861f328474fe25ad38496d284a87962e1ac1cc837741b9614275347c3e5b

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

75ea4cb7f040eb3056eaa4e86a3a9d6c

C2

http://91.215.85.146/

rc4.plain

Signatures

Files

  • 2568-137-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections