General

  • Target

    4856-211-0x0000000000400000-0x000000000062B000-memory.dmp

  • Size

    2.2MB

  • MD5

    d806ab5b6ad52741d7687db8259c97ab

  • SHA1

    11aa94fa55204acf0efc775ee9c102ed2b95fcd4

  • SHA256

    4b554d8cb3560440488b65a9024a5a1893ec79244bb67fad2766dd38b2e57af4

  • SHA512

    cb8179a37b80ececbf90bb9c397fbed81509180f712e66676c12f39f3828e3b5dd16bb47c7cf2be059f9464d9fa2824a04bf016d7146eb69cb13aa27b15da020

  • SSDEEP

    3072:ToeUqu2BUAeqX/oqMoEB7M+bcRziTbHl2J1G0clB/YQUu:EeUqBB+qPp+bYEbHl2m3lhYQ

Malware Config

Extracted

Family

raccoon

Botnet

f0c8034c83808635df0d9d8726d1bfd6

C2

http://45.95.11.158/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 4856-211-0x0000000000400000-0x000000000062B000-memory.dmp
    .exe windows x86


    Headers

    Sections