General

  • Target

    2228-57-0x0000000000400000-0x0000000001B42000-memory.dmp

  • Size

    23.3MB

  • MD5

    f74cd525a7e412ab6d21c1e7bd742b75

  • SHA1

    6806752156f867be49badc2d886ba608077d8ae0

  • SHA256

    a93f29588dfd58810511a3e1495cc07910e5ed6a7fe1d77e5b5ebf1425f9b17b

  • SHA512

    ac874f35c6020d6d0a3fb2c337059a5c398c3424d7567d6a7de4bb30a306030f2f32ba57442a28892aa838a954d2df15be27546e4d62f0756c26a2eded7f500f

  • SSDEEP

    3072:YyJXprKUREJTP980vfvbkYoUvNFaMbSyPlt:YeX/RgF80vfvbRvNzH

Malware Config

Extracted

Family

raccoon

Botnet

3c85f6d12f0866626b35b64056ce8880

C2

http://5.78.98.26:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2228-57-0x0000000000400000-0x0000000001B42000-memory.dmp
    .exe windows x86


    Headers

    Sections