General

  • Target

    3000-56-0x0000000000400000-0x000000000044D000-memory.dmp

  • Size

    308KB

  • MD5

    bf7908bdc4d6b7d9c6079b1b99325be8

  • SHA1

    4478c385891e896aa8a243e9ebfcb8d29787e8f3

  • SHA256

    be0c15af7dced1bbf0176a230ed8d4f07b4bb4c8799e1855bd10d2674b530262

  • SHA512

    a1136b6936e307db2d637becbc14e7769bddf80c5cb80cef0f87946d9b3723fe2bd2f5d3352ccca6db53ae8f696856b1c21012c9f2995fc35e5fb4445571c250

  • SSDEEP

    6144:YCWMCnPV2bJkDEYwuzsBdhD9dY8sTmTO:LWR9IJy3T4BdhARTe

Malware Config

Extracted

Family

raccoon

Botnet

3c85f6d12f0866626b35b64056ce8880

C2

http://5.78.98.26:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3000-56-0x0000000000400000-0x000000000044D000-memory.dmp
    .exe windows x86


    Headers

    Sections