General

  • Target

    posdkgpf.exe

  • Size

    50KB

  • MD5

    9ede0f4c110e8a6cf414a61b2f2c0638

  • SHA1

    1a68f4b8efadbef45cd8458bf6a1bd3fae88e211

  • SHA256

    a121408015206dfc63e67224b6eb942148ac32503cb38dcd72aa1f92dd1c28f9

  • SHA512

    e608aed85802ef43c251d40b825cf69305d132f9727e97bf2cfd30c842d0b1ad005ebbd3a89f7e0f3bae7eca8bd6232960cf4d0c7a14d4161479f4999a561578

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW8msk:T2t4cybq56O84

Malware Config

Extracted

Family

raccoon

Botnet

096ae0abd5dc092f6ef353a6f4df4f03

C2

http://20.122.41.213:99�+

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • posdkgpf.exe
    .exe windows x86

    8293f3c89c8bdc2a5d082fbe7d24c76c


    Headers

    Imports

    Sections