General

  • Target

    1448-56-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    67c27adb21c4ae9e0f8f6f04d465080e

  • SHA1

    dbc25dadb58efac17a1c65d93d6b0f9301fadceb

  • SHA256

    cab4edf5b37395003f0b9aa729d43371cb437b04761d047a98e03a1d30746376

  • SHA512

    cbe24ce0fa09afac2aa65b5196ab78b73a67569864d2092e104ac464b3fba489a4d343367ac8b48802da3f10cea93a71d38d69fece72b60f6c280f24e6e83b30

  • SSDEEP

    1536:Bpaiq0I2XvL/5kVvpyITHAOEH8pIZ+msXvsfJre8oJ1C7uj9m:BpaikE/5SppIZ+m2sfJrebJF

Malware Config

Extracted

Family

raccoon

Botnet

bbbd8c4f062887157c5c54f47994f907

C2

http://103.155.93.161/

rc4.plain

Signatures

Files

  • 1448-56-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows x86


    Headers

    Sections