General

  • Target

    4968-140-0x0000000000400000-0x0000000000E41000-memory.dmp

  • Size

    10.3MB

  • MD5

    57cf7ca16f2974bd938e6be14519dc0e

  • SHA1

    9efbadc0236273d48dbd8952735a7b561751bfbe

  • SHA256

    a461b66d457c37c92ad508620c384e51fe5db134ceee93ec4343b4be62920f9c

  • SHA512

    2147289a5c4cf05c4b6873c10963870935220c67557f5316465f16ec943a3a220ed0037c5f2adb8354c9152fe92c85948811f4fee3033a43678e58c390471df4

  • SSDEEP

    196608:CdM6xjDKF3UOKkHgdjGyHkpUI+/B0d1FOw1vGzZQ7Ey3aHczOBfmpLHe+V:C/FKtqdBRI7bowozaQy3NzOcHe

Malware Config

Extracted

Family

raccoon

Botnet

f1c3f7a3e12da19758239f0284e7dc2c

C2

http://83.217.11.34

http://83.217.11.35

rc4.plain

Signatures

Files

  • 4968-140-0x0000000000400000-0x0000000000E41000-memory.dmp
    .exe windows x86


    Headers

    Sections