General

  • Target

    4844-132-0x0000000000400000-0x0000000000DFB000-memory.dmp

  • Size

    10.0MB

  • MD5

    db05acf7735ee9cf25a767df87968686

  • SHA1

    41ab84e03b44c06c8d80294234b0dc6e02da0201

  • SHA256

    84ef931cae7ef69e444b39faa7f8feeff4c990adffe9dc93fc0359a3a4d5b87b

  • SHA512

    5f4c73942ee464416fc7b99368eef9993f2696988aceef44e11e5aea2bb556783268fb03b156cabbe0c056805e041a2d68edcfe509dd0264f8c04a1c17c85d03

  • SSDEEP

    196608:+IIZYw0+FqtdZhgbi48MIYvSE2/bSOCD3GS/tYWQn2H0+cdFCsnS5HGgAHfJMBW:1IZHlUtdgbAB7bCCSiWm2U+c6sDh

Malware Config

Extracted

Family

raccoon

Botnet

717609e6131226f92ce8ce08c34305be

C2

http://83.217.11.23

http://77.73.134.82

rc4.plain

Signatures

Files

  • 4844-132-0x0000000000400000-0x0000000000DFB000-memory.dmp
    .exe windows x86


    Headers

    Sections