General

  • Target

    1976-54-0x0000000000EA0000-0x000000000194E000-memory.dmp

  • Size

    10.7MB

  • MD5

    99ab07056e47556ff50124171db5fbb6

  • SHA1

    60a7f6ed89b79cbfa803bcf73031ec5e1ed7bb8f

  • SHA256

    3674c4312183275869b82703d3aea8dba65310c76b7d95ffb49f798684918b9d

  • SHA512

    baafcb22827796113baa37a392b6c5c8e42ec892676c01790f23187bcca39f2ad3eb542e2583fcc96fd79510eba721115121f8a87d0bc18d61f8482f278c4134

  • SSDEEP

    196608:YaSeBfzYpco9spIW6VnDGE7jM5IvZ5w85heJ92bz30q/OQTWLkPergrrD6vZ6FzV:YaSeRCvWqWiCWjMQZCIhQ2Mq/OQK2DtP

Malware Config

Extracted

Family

raccoon

Botnet

839b5f035af17fe32dbee0ca113be5fc

C2

http://89.185.85.53/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 1976-54-0x0000000000EA0000-0x000000000194E000-memory.dmp
    .exe windows x86


    Headers

    Sections