General

  • Target

    3868-162-0x0000000000400000-0x0000000000425000-memory.dmp

  • Size

    148KB

  • MD5

    b32936ab396141c2db0beb3405985eac

  • SHA1

    f56fbde36c9cc5f4486a16b895352dc4022b2c77

  • SHA256

    c822aae792585111404327150a4de94bca41eb426bb8466879fcdfb6bd550d0f

  • SHA512

    f480d326e9141c4b12cca45d1ad2899ffbf56fa8ad6693ca62665cc4658bf147526581fda386eb51e552ce8b8cd9ad917f4aaa9cd21fa2d2ad47ba6512e99188

  • SSDEEP

    1536:GY5KCXch1xZEVQnPjUMg0XfXBOwbzR14iwelTKMTarb57b8CBm0DasBIdPKz0fex:1Xch1x0QPtfEwP/wUaR7b8CBmChIZK7

Malware Config

Extracted

Family

raccoon

Botnet

073a56fe38eae9c7effa31d6284ce988

C2

http://5.39.117.99/

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3868-162-0x0000000000400000-0x0000000000425000-memory.dmp
    .exe windows x86


    Headers

    Sections