General

  • Target

    776-64-0x0000000000400000-0x0000000000425000-memory.dmp

  • Size

    148KB

  • MD5

    028e167494aba805e1eda777f07b5a7e

  • SHA1

    086c3f5ba1d672be4e21ae5dc86bc8c37419a549

  • SHA256

    b4bfa2b43e910f6054e3d0a276a3b39b1194bb675068f7b21afb103d9f14ee2c

  • SHA512

    a757998686cb837cb68f072f350767ca0c6acb038e20404bb3eda1a8166b7fe013d041434ce3705154058d3beb02757e5a46d33d74efde713b86fe7bddcee8ef

  • SSDEEP

    1536:GY5KCXch1xZEVQnPjUMg0XfXBOwbzR14iwelTKMTarb57b8CBm0DasBIdPKz0fex:1Xch1x0QPtfEwP/wUaR7b8CBmChIZK7

Malware Config

Extracted

Family

raccoon

Botnet

b11c37ed36597cb6d2adb8b6280a6e12

C2

http://94.142.138.32

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 776-64-0x0000000000400000-0x0000000000425000-memory.dmp
    .exe windows x86


    Headers

    Sections