General

  • Target

    1748-57-0x0000000000400000-0x00000000016F2000-memory.dmp

  • Size

    18.9MB

  • MD5

    898bf256fd744b9a4d51d5720846d5c5

  • SHA1

    4cd14cc88b21f024b20497fcfd23a32dcc344905

  • SHA256

    d738c4d45e529169a2b55a6cf7117cd84db22d7b7bcd3078fde8306b6e2304ef

  • SHA512

    cbc48b120358f0690056251fd8d4b631008b08e6bfde121d5dcac1d487c82d187adf28f85607c7fb6402081f4b211cba0caee24fdaf56f39932331eb17183f7c

  • SSDEEP

    393216:CN4SQfSoLRVCUFb82s5R74vs+pJE2P1efa8KaKd3HtK/itFNPEJ:CN4t7o8lq2ofXKaKR8qDNEJ

Malware Config

Extracted

Family

raccoon

Botnet

091ee05eafd24e97a5ef6c9e06f96448

C2

http://94.142.138.107/

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1748-57-0x0000000000400000-0x00000000016F2000-memory.dmp
    .exe windows x86


    Headers

    Sections