General

  • Target

    9241700x00000000004000000x000000000040F000memory.dmp

  • Size

    60KB

  • MD5

    e20dc22b0cde7506bf31faa0eb55d443

  • SHA1

    5761ab5654e2382aede3b052fd3141778d3ce755

  • SHA256

    6b081bfa2e2fc04c477c80a1e3c4bb9c43ecfa77ff2268bf18a65c465d50a647

  • SHA512

    c52a9908fb4e00be6a707c2c98578d669bf0857aba4ac76e2fd824b0bbd15e08bed600516a8fc6c9a0219e0b29a7898553252b6b09cb99ec23d6c8166019772b

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW8msk:T2t4cybq56O84

Malware Config

Extracted

Family

raccoon

Botnet

iByteToWideChar

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9241700x00000000004000000x000000000040F000memory.dmp
    .exe windows x86


    Headers

    Sections