General

  • Target

    2000-54-0x0000000000400000-0x000000000091F000-memory.dmp

  • Size

    5.1MB

  • MD5

    bdf63578c4b5f772db6c811cea5dd470

  • SHA1

    15736db2436c75b5a96e4687d547178f479d83d6

  • SHA256

    c6fae1720176cd2d38fa23885459b93501367b315970da15a85fc99ebca0bd2f

  • SHA512

    fe9dc6f6116a31e2f54680247edfe2e194ad15aae60d7118b274952875e025f00c6c35adca0795fa3add4cf3c8c60213b28a689bd65408a6085e34ab0245abf7

  • SSDEEP

    98304:Uiflvmpvq3+QvVde8FivCeGDRsiScnXBgZrzyWGgRSL6O2jSk6adBNWuz+VRD0Mc:D2iOYZFwAurCXBazEgRSSjS5aT1z+/DS

Malware Config

Extracted

Family

raccoon

Botnet

540b1db0b12b23e63e6942952aa03e47

C2

http://45.9.74.36/

http://45.9.74.34/

rc4.plain

Signatures

  • Raccoon family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

Files

  • 2000-54-0x0000000000400000-0x000000000091F000-memory.dmp
    .exe windows x86


    Headers

    Sections