General

  • Target

    2196-56-0x0000000000400000-0x0000000001B40000-memory.dmp

  • Size

    23.2MB

  • MD5

    880ff4bea37bc7362676eabd54238942

  • SHA1

    73ed708695b4612edaad99aaf108c021219603d3

  • SHA256

    81f44271a3f4a3303569a07d74c447ddd8ea1c60bdd2f4ea26cddc36d1bda62a

  • SHA512

    c6be1c807444491a66c3c005cf52913f04ed38b208e94075a5fbce16f061d25a0bdb4d8dc63e37647502ade0d7898af95afed6662b8013fb1a642f4a51d6e812

  • SSDEEP

    6144:YZ6FhFSvGpDbnD6suIhfQFTlPPpMsTwUA:Y6vFzpH7Ns9t

Malware Config

Extracted

Family

raccoon

Botnet

3c85f6d12f0866626b35b64056ce8880

C2

http://5.78.98.26:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2196-56-0x0000000000400000-0x0000000001B40000-memory.dmp
    .exe windows x86


    Headers

    Sections