General

  • Target

    1956-54-0x0000000000D90000-0x0000000001863000-memory.dmp

  • Size

    10.8MB

  • MD5

    7fca41c0726c05081b0ffa4e988e3960

  • SHA1

    f3cb2634bd71a14731f519e3322230a27d8df75b

  • SHA256

    7ac8da011e3287dfc131d29f59bd1496626b55d53fc8ee14346d9728154d93b4

  • SHA512

    4ac107ab54871ecb3b35eaa271debbf096aa69c7da7b021ec625a0ca8299370ee7356182aaf94f1a9b79e1a46acafb03d2eacbcc703561a499ad70182f06d7e1

  • SSDEEP

    196608:qCtQgg1z9s5q1ug8+lYscWgPLYRokn831cpf+iEj5K0fMJHs2Lg4b:qSQggl6U7KscLSoS01cpfoK0mbL

Malware Config

Extracted

Family

raccoon

Botnet

33517255a0ef9f5788ac22aca65a1b63

C2

http://23.229.117.245/

rc4.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family

Files

  • 1956-54-0x0000000000D90000-0x0000000001863000-memory.dmp
    .exe windows x86


    Headers

    Sections