General

  • Target

    4900-141-0x0000000000400000-0x0000000000F2D000-memory.dmp

  • Size

    11.2MB

  • MD5

    d3fd3e064a40bc3ea78bad86d8f828c8

  • SHA1

    cf5c302bc18dce073adbcb0cc3bcd24cdb575996

  • SHA256

    8231913e9b2cfe45cacec5d964d34ae8ed854c2842465a84b8fb4972dc837e02

  • SHA512

    f3bbddff015aea788173868c1cc9bce720cd34f366560e3422e6e12c5030ef203400b2c491b3783cd40b62fdac3bfa336d0d3e1ab5f589fd0c9bcc38bc2546a1

  • SSDEEP

    196608:kc9hxqJ+ymOuBASGkxdlOOjteOkBkoGNu/6bIN6aEIqGCG2EuhdheNKAcqvW:keqJ+8uBq2MGoOuESxEFzhdOKFqvW

Malware Config

Extracted

Family

raccoon

Botnet

8fb7b851641d456f39570978e99f780e

C2

http://45.15.156.239/

rc4.plain

Signatures

Files

  • 4900-141-0x0000000000400000-0x0000000000F2D000-memory.dmp
    .exe windows x86


    Headers

    Sections