General

  • Target

    328-60-0x0000000000400000-0x00000000018F0000-memory.dmp

  • Size

    20.9MB

  • MD5

    760f489ae4b29117d152e802d2131e52

  • SHA1

    9a18c4a126dc56f8c90ae85bb7ddbaa6cc6ec27c

  • SHA256

    391392093a576347334cd3a1d01fc35b488acb0d3eff040a74b92853ff7ad49b

  • SHA512

    9ef1300dc33580913e311f7e9e6c325d3934f43c2d9cd3d175913b6d0ebb736a1204b68e4d02c66220d2134f0d2935313786cfae3d53c155b093bd179d72dbad

  • SSDEEP

    393216:wJ7GL9zVFWdcZil9WIG16EieCdnidQhBZ0xUYtWHm3VeSqN1muvlAmuprNbt3AcK:gGpzVpMl9u6Eibnid41g3VeSqyubu9NO

Malware Config

Extracted

Family

raccoon

Botnet

956d6fc3a814efc12713d3f924f5f66a

C2

http://45.15.159.249/

http://79.137.202.245/

rc4.plain

Signatures

Files

  • 328-60-0x0000000000400000-0x00000000018F0000-memory.dmp
    .exe windows x86


    Headers

    Sections