General

  • Target

    1804-57-0x0000000000400000-0x0000000001B44000-memory.dmp

  • Size

    23.3MB

  • MD5

    d0450fd2d61b97b40e478621e030f77d

  • SHA1

    2169182dfd285adb335c0a90743d1db14b8e4b13

  • SHA256

    fd6d1f06c3430e937050657a82340bb1d4e337d709a0179e6caf83facb26b67c

  • SHA512

    8833addf4c2a9f3a2f2eb07ef59f8123e10e5fe3dca61011bf4bb1abf82c2e4acadf367d709734f7311031a1c51565f9b7ed6a23810fb8485578835ef69d8ec7

  • SSDEEP

    3072:YyXrxebtMhFG8yyrHe6PKMFrXh5ibGflYkLePKlm6jM:YIr8tcBTJy+bhaM9qK5

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1804-57-0x0000000000400000-0x0000000001B44000-memory.dmp
    .exe windows x86


    Headers

    Sections