General

  • Target

    1616-154-0x0000000000400000-0x0000000000411000-memory.dmp

  • Size

    68KB

  • MD5

    b104f6b4634ad2a10960c0d60bd482e8

  • SHA1

    1b61873faa996ddf3534a55c19a15ee30f737aa6

  • SHA256

    c59033b7f267a1e4e0715c2174f4f4338461279e921e1b6399283abf5c901d81

  • SHA512

    28b93662153cc8da845468a32457aa9309d0ad57fb28729fc29466f9d8fab034dd2b31746c4113d24c9f86fbc7700229b6b74622ad706b6e1d3ee2a4cf16361a

  • SSDEEP

    768:I+6wtoXuUHKxI2zN5JjR2yAKJwA2eLVv3z5nNYJNKEz1qxsuSex/J:I2toeUqu2/5AKJwA3vnNYJNpzVAJ

Malware Config

Extracted

Family

raccoon

Botnet

8a4fd4b44997ba634230ba5c422ca9f2

C2

http://193.106.191.146/

http://185.215.113.89/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 1616-154-0x0000000000400000-0x0000000000411000-memory.dmp
    .exe windows x86


    Headers

    Sections