General

  • Target

    2584-56-0x0000000000400000-0x000000000049E000-memory.dmp

  • Size

    632KB

  • MD5

    8a2c103192a3826c9724987240260094

  • SHA1

    ce13c590f656c504b702d013f16354caccd61dd2

  • SHA256

    01f7a745c220ef68d0fa86646a15a4454dc28125edb8478c2998748787408c47

  • SHA512

    3f9d17ac34d909b4f4ecafe1d9b2dd6c2a5a32d22a05bad8ab4a424ff07d272d8d550db2c8b239925d89a57140343dc1c9e2fa79332c97ff0789fce322d5b070

  • SSDEEP

    3072:YyDaCBWUi0OxcNAeeu+1ac+oCZMcqpvCZNIMI5kdWU:YkBI8OxVlBwc+oCcvCZ2M9dW

Malware Config

Extracted

Family

raccoon

Botnet

6e489b600db6a7cfd6a1b65b9a5a61eb

C2

http://5.78.111.161:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2584-56-0x0000000000400000-0x000000000049E000-memory.dmp
    .exe windows x86


    Headers

    Sections