General

  • Target

    1260-58-0x0000000000400000-0x000000000047D000-memory.dmp

  • Size

    500KB

  • MD5

    21e65f3fc580a9dd1b601af5d6d6a204

  • SHA1

    a4206c4dffd9c3444a81fd2a8235ab78ee3ed82e

  • SHA256

    f4ba8eaa551f463220c11e4ea20c353147b2963585770976027eba4828352f7e

  • SHA512

    31e03b0ed9c42c901a07e5e90beee23f77aa1a7d3a25bc7e0e049c997d4cf2da149d53398477454f22a0199fdcfb7b5288aaaa4f14085b2c8e94503f27d2cc12

  • SSDEEP

    3072:YyDoxp7j5TqTZ7rAhgAWCb9j2ig8A4exWkmdCV3/HF:Y4S7jF6ZHAlWe2P8A4Wt3PF

Malware Config

Extracted

Family

raccoon

Botnet

6bb5fbdb7121bc7ea628330bef79c129

C2

http://5.78.78.150:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1260-58-0x0000000000400000-0x000000000047D000-memory.dmp
    .exe windows x86


    Headers

    Sections