General

  • Target

    1780-62-0x0000000000400000-0x0000000000411000-memory.dmp

  • Size

    68KB

  • MD5

    9d24975f308d220f8d41cf7b995f33ab

  • SHA1

    52249e08f86d88be9052474b17d2e54b4edeae2b

  • SHA256

    28559d7ae1e9ffe6e268b053ec860bc180935f3d0bf0b24cab33af270c40f3c3

  • SHA512

    be1780c1d384eddce64923b5a42dbecc91d5bd10cfb3097a1a021cf6c69330dcfea9009a2b2b06fa261bdcf71d52845aa090391882c5d62f835d835b071c5b9b

  • SSDEEP

    768:I+6wtoXuUHKxI2zN5JjR2yAKJwA2eLVv3z5nNYJNKEz1qxsuSex/y9yoOBMM:I2toeUqu2/5AKJwA3vnNYJNpzVAFg

Malware Config

Extracted

Family

raccoon

Botnet

12ab26c1b0d2b25d17762b862d7e3e2b

C2

http://45.8.144.152/

http://45.8.144.153/

http://45.8.144.151/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 1780-62-0x0000000000400000-0x0000000000411000-memory.dmp
    .exe windows x86


    Headers

    Sections