General

  • Target

    1092-55-0x0000000000400000-0x0000000000425000-memory.dmp

  • Size

    148KB

  • MD5

    74584ebf023d6bdcf3fa1191be208431

  • SHA1

    c32bb6cbdd4465d11dc4f90051f88bba69841f9b

  • SHA256

    41cfc32acffa23468e1ed3a92910feae243c7d06071f8d8e573ded37d00476b1

  • SHA512

    da2c235576f2467080379e6e818e1592722bc99f7969e30c2c65871527100d6dddee8f5ca1c8903e4538ec0a99b563c0da3ca39332ae446f4a2cecad78d408e8

  • SSDEEP

    1536:GY5KCXch1xZEVQnPjUMg0XfXBOwbzR14iwelTKMTarb57b8CBm0DasBIdPKz0fex:1Xch1x0QPtfEwP/wUaR7b8CBmChIZK7

Malware Config

Extracted

Family

raccoon

Botnet

5b7eff386f31487f5db4c7f0e4006546

C2

http://165.232.118.86/

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1092-55-0x0000000000400000-0x0000000000425000-memory.dmp
    .exe windows x86


    Headers

    Sections