General

  • Target

    1696-55-0x0000000000400000-0x000000000049A000-memory.dmp

  • Size

    616KB

  • MD5

    a4c81d032798c99fe8268e1a30eb2565

  • SHA1

    ae99bc1e0c4ffefdd43bf33832e537d7e06f7107

  • SHA256

    17d311bf4fddd043146e09ac28d74610ee717d9afbfc790cb6518574ed0269b6

  • SHA512

    656b3330225aad98e00b118a466b444969ece76a141d2dabe166607f202adedd93f03f8e905be03b55efbb24622264c57467ec68441c85397e14f45450475977

  • SSDEEP

    3072:YyIW/2h18WiO68oWeWJXZMUx7Ltbj6Jh58B+Yl:Y3W/k1piONneWHMUxftbTB+A

Malware Config

Extracted

Family

raccoon

Botnet

6e489b600db6a7cfd6a1b65b9a5a61eb

C2

http://5.78.111.161:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1696-55-0x0000000000400000-0x000000000049A000-memory.dmp
    .exe windows x86


    Headers

    Sections