General

  • Target

    1928-86-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • MD5

    c57780913f0d4270b38b3d88f412ed2d

  • SHA1

    ee9d8d77c232c60a0bf97cebfcef8ee1783ed900

  • SHA256

    be6b4c8f6a341e43aaddc8457117044509cadbc1210d7cc51f155b80bbeb94a9

  • SHA512

    3b7ac8ba0f71baedc50aa4000e6ac6bbe1e98d63a070255560a5b82e79039c81b40b8c4cf3ff8637d1f0d0d9bbe0dcb8ca37c65a62ffcbd693e916f999e4805e

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW8mskK:T2t4cybq56O84K

Malware Config

Extracted

Family

raccoon

Botnet

3f5db940cf0d55359bd7997f1d8cbde7

C2

http://91.242.229.237:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1928-86-0x0000000000400000-0x000000000040F000-memory.dmp
    .exe windows x86


    Headers

    Sections