General

  • Target

    1320-60-0x0000000000400000-0x0000000001C4F000-memory.dmp

  • Size

    24.3MB

  • MD5

    8c673018f7116199bc3cacd7d057917d

  • SHA1

    32002625761496c1ae99c2eb68bce226fe1e3b25

  • SHA256

    9951378cf876e52f47241df7e72700eced6801fd4f0944297affb9b4323c68ce

  • SHA512

    9ff3494e040fbd1cbbfa04411384479d145d2a777b5ff4b48b9651264277ab2e5bc85d53529c6cb4af9ece6d2419786189cad0a42b7df6b838f14eb825c8a34f

  • SSDEEP

    393216:M4+lhnISkNMaYWTSjec8ASEZjgZVklyh98/PPL7D4qsuco+RVy2E5140lqHbNUuY:R+rISkNpYWT2ajX98/PTYq31TqHT

Malware Config

Extracted

Family

raccoon

Botnet

9acc0b4b109f517573794147c09af4c8

C2

http://94.142.138.208/

rc4.plain

Signatures

Files

  • 1320-60-0x0000000000400000-0x0000000001C4F000-memory.dmp
    .exe windows x86


    Headers

    Sections