General

  • Target

    4928-132-0x0000000000400000-0x0000000000DBE000-memory.dmp

  • Size

    9.7MB

  • MD5

    4be6141d4e13a27658602af42966014e

  • SHA1

    46cedfc9556c6d58de8a32d18adc859b2e474f21

  • SHA256

    884b24a713be6635c6a60b48f840c34b2b9046002cbb5fb57f9beea1539f0fe8

  • SHA512

    22ca7c12cf20474f4fed3c1bb4c8b712fc0464053d7d97955a417c8756d86de8b3796a9d15f9ced69a01ca895be16e184f2a29e9c4db143073016dc163e843c3

  • SSDEEP

    196608:AWnUd8sJ378K43JkBdHqo8R5Zf3hXUUM2SCRZs2wECDsQhN87LFqQCHQkScDB4:AIUS+r8K43WdKH9f3hkMzRZs2wECDh8F

Malware Config

Extracted

Family

raccoon

Botnet

3cfafe5ac067c908220fc0fce1cc69e1

C2

http://194.15.216.23

http://5.255.100.41

rc4.plain

Signatures

Files

  • 4928-132-0x0000000000400000-0x0000000000DBE000-memory.dmp
    .exe windows x86


    Headers

    Sections