General

  • Target

    1740-60-0x0000000000400000-0x0000000001DF5000-memory.dmp

  • Size

    26.0MB

  • MD5

    022f74dd9b10f57c704775fa2f57dc1c

  • SHA1

    34bf9367e85c3291b779267bfe6433a1beb78489

  • SHA256

    ea67dd7a96dc710edd97a2beaecd007d1d9f21d7b017b4f6249736a60ffc08bb

  • SHA512

    beaaf6f34ef5857acf5b6d1577b088b7ff270a76388e6600dded3884547d4ac7ecdb8f9ae04bf14bd6f1e079663c044ccee6846f585673ba42e61085d30f3e1b

  • SSDEEP

    786432:a/CM9HGY3l3fwCbEdFR4GWm9aCAe2rAp:a/CamlUoCDA

Malware Config

Extracted

Family

raccoon

Botnet

e8079d22e46847399691305c53f6386c

C2

http://37.220.87.66/

http://45.9.74.99

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1740-60-0x0000000000400000-0x0000000001DF5000-memory.dmp
    .exe windows x86


    Headers

    Sections