General

  • Target

    780-54-0x0000000000D00000-0x0000000001786000-memory.dmp

  • Size

    10.5MB

  • MD5

    a1dc4707be421d5967243db349e9afdb

  • SHA1

    8199ab305ac8a2a25b0a0d170bb2f0b5dddec553

  • SHA256

    65eba58f241b0e02f674f26dd43bc31b181fe41b1da8bd58b705cff757f59536

  • SHA512

    5a860d5c0d48adcecdd8074ab350148363730975ab157b910b07535c15ffafea836d08613be0b825335c3b2447444baef413e3c54451715406570e492660d624

  • SSDEEP

    196608:1B6YpkhmCCH0yPDFqrKbkRybtJrqOmYDWmQc7hwLHgWac+yX/BAoxmM2p9x0J9:1B6Yp8mCCHXPRKKwRyb7rqOYoh4AgFXF

Malware Config

Extracted

Family

raccoon

Botnet

b3e62a345d90ee80b30dcc988ddc399f

C2

http://51.195.166.185/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 780-54-0x0000000000D00000-0x0000000001786000-memory.dmp
    .exe windows x86


    Headers

    Sections