General

  • Target

    4792-141-0x0000000000400000-0x0000000000F2D000-memory.dmp

  • Size

    11.2MB

  • MD5

    d195beb555fbaecf3d6907cf96386521

  • SHA1

    4c5bd451532ff61d697518a53d23eab0691af7c8

  • SHA256

    bb10172405644e133a3ea64531e4c18e1317d85bd699e49d7749f5070644b5b9

  • SHA512

    3cfc6aecfa7761e9ef3507c3cd64235459a4dcdcebe36b7b7684edf26c152c1d7e1bb1880e7a588defc2c45a78a681f2820aab6753065007c353d53c9fc93397

  • SSDEEP

    196608:Te9hxqJ+ymOuBASGkxdlOOjteRkBkoGNu/6bIN6aEIqGCG2EuhdheNKAcqvW:TwqJ+8uBq23GoOuESxEFzhdOKFqvW

Malware Config

Extracted

Family

raccoon

Botnet

8fb7b851641d456f39570978e99f780e

C2

http://45.15.156.239/

rc4.plain

Signatures

Files

  • 4792-141-0x0000000000400000-0x0000000000F2D000-memory.dmp
    .exe windows x86


    Headers

    Sections