General

  • Target

    2196-57-0x0000000000400000-0x0000000000472000-memory.dmp

  • Size

    456KB

  • MD5

    58b181f1cf980b583222f9911f22fc18

  • SHA1

    cdc655db0bff3efae31822bd020c86f353b2b47b

  • SHA256

    4c381ac58322e5386ee136daa52f80c3cc20bcf4615445439536e052bede80e5

  • SHA512

    6c243626d1b8289d812f23f5702f14870c3730df5c15c6725a5da6a561802f7689d8854a4330e3d7eab49567ac9b7ea30884bc7fcdd2f92fe65ab35603f81539

  • SSDEEP

    3072:YyaweE2ylZtoK3RsNr/GoKBCEBdfWGUE05TaxSnJscL:Y9MhLZ3eNr/PKwMdfNUxKOC+

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2196-57-0x0000000000400000-0x0000000000472000-memory.dmp
    .exe windows x86


    Headers

    Sections