General

  • Target

    316-135-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    f02b3b10868cd6239670c06c1a6021c8

  • SHA1

    5584c6e996f86bd5837fc4cbc9834818c790d3b5

  • SHA256

    d76e8dd4ef4ff386380e5d17968c7b623700772e47c4db1870c06aa36f9b846c

  • SHA512

    8efa20f03b28b57730dfc0281b973cb207b43b87a86daac3543da333c9689d18cd2e3754db0e8d6face77a7fda04f5152efd1d08eac8167aa277046c887bf0a1

  • SSDEEP

    1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5:QcjzCB6WfhK4IULps3K6RbSlCPiSE75

Malware Config

Extracted

Family

raccoon

Botnet

8f650ec018d9fd14688866b3230c4641

C2

http://147.78.47.232

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 316-135-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows x86


    Headers

    Sections