General

  • Target

    3816-141-0x0000000000400000-0x0000000000E17000-memory.dmp

  • Size

    10.1MB

  • MD5

    658dfa09f77681ab8cb689c8805afc26

  • SHA1

    d80b69e182305280b042d5fbf607862604ac45b8

  • SHA256

    8f57b61f9c81a6da923b94e47711385a2584a8d69499ebf769661ebe577e3ef7

  • SHA512

    b3158003f7b3503d6b1bc0653f44cf0bf92f645b2df7a98d4a15edddbc2d8adc59a413b84080c99501932c4db86b50a849e1502e2dd75752305fec0c1458b610

  • SSDEEP

    196608:8w3SbNMQBfjyUJcZL1iIilMKJavg7SY5x7MAsbbrQ445Fwx95kHt8ESZhY3ko:8w3ZQVx6aL6SOY3zYs25St8R

Malware Config

Extracted

Family

raccoon

Botnet

12b578c7e84cde40470e7033ed07e072

C2

http://37.220.87.66/

http://77.73.134.0/

rc4.plain

Signatures

Files

  • 3816-141-0x0000000000400000-0x0000000000E17000-memory.dmp
    .exe windows x86


    Headers

    Sections