General

  • Target

    2032-56-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    d5bc1a681163138413b2a4f8191f58ea

  • SHA1

    b88427d9662944271d10a7bad90be9094c6919f5

  • SHA256

    bb53c1fa7dfd8fde0ec776178f1b5034933fd75e858e1865a10ad4e4c0efecf4

  • SHA512

    7505987a1bfb8e5476b60ba2cf65bea0093a90c5295243953a8cf19461317173e6b07674728666159c8d402f331395fc8d23dcefd6eb11f6b542e45a80c26884

  • SSDEEP

    768:dxVfxVAXFOKEca8dzVRW3Wcb9JhL7OxDZ8m4aUe7vST0o+EnauyZ68nkG8qj:/Vp01Eca2zL+9HhLUDZ83BT0o23198

Malware Config

Extracted

Family

raccoon

Botnet

2dbfb7ebbdc8183124d0ac1729de140a

C2

http://45.15.156.62

rc4.plain

Signatures

Files

  • 2032-56-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections