General

  • Target

    2948-93-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • MD5

    311aa7f397c7f544c328b1b94eda1481

  • SHA1

    7e81a3a991a4d9eb0f2491c1214ac33f4c882f00

  • SHA256

    f253ae260088a6cdd3168de2dc49f7cc5d6078944db4294be0e556a73e80f737

  • SHA512

    3324b45c2df3ba67b85cb69d984475243bd48df08f5a291400d54d2862c38ad5b82e204d142e890a8317aa5172a44b2058827fad8243b4606d8448faca8641b3

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW8msk:T2t4cybq56O84

Malware Config

Extracted

Family

raccoon

Botnet

e4069b8c4993c296232585045074ce47

C2

http://94.131.106.27:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2948-93-0x0000000000400000-0x000000000040F000-memory.dmp
    .exe windows x86


    Headers

    Sections