General

  • Target

    600-55-0x0000000000840000-0x0000000000F97000-memory.dmp

  • Size

    7.3MB

  • MD5

    de5b23b649e2bbf037e971a775d6b9e0

  • SHA1

    17715f600de366de53f68999d0ae8341e43ca82c

  • SHA256

    48fe375476f91281f4ce711375d7076b34690802e72ccdae9ba39ff4f3c2813a

  • SHA512

    8e8211cb80c25f551d22f23d93c880d4624a159ccecf7c61cf2277acd4426dc2783b2be40859e1e3b17fdbc48a1f4f017e71367e50fc020155a0b9a268c989e9

  • SSDEEP

    196608:vYUCaE2K6u7cVr8JLYO+T/rsIMOWlpmjQTsWGZr:vPE2fuQV4JLYOQsIMOWlAQFG

Malware Config

Extracted

Family

raccoon

Botnet

517bb0d640c1242c3f069aab3d1018d6

C2

http://51.195.166.178/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 600-55-0x0000000000840000-0x0000000000F97000-memory.dmp
    .exe windows x86


    Headers

    Sections