General

  • Target

    2496-56-0x0000000000400000-0x0000000002421000-memory.dmp

  • Size

    32.1MB

  • MD5

    371cb4e5d4531271ffe713bb63635e8c

  • SHA1

    6cd8a5c3b2e6f5a93e631f9a31323a547173caf2

  • SHA256

    9bfd5ef90b030ab4ad7c396a348f4d4df277c4e8896d92b0d1f5c6472644ef6f

  • SHA512

    92a83ae64633997bf03660285a8e3ffa305fc39ed0cc5206918c44374748e1c6159ac65f1eea8596a576605c44c85dc68467a01762f5d5505885c2c7c22831ce

  • SSDEEP

    3072:Yyy7f7Fdry+yonVxcvx3pq+HCcm6yetmU59STvCzS0Jkue:Yh7fHm+r4x3pt3mde4Qg2SL

Malware Config

Extracted

Family

raccoon

Botnet

20f4a91c61f63af35df3e278591a8e70

C2

http://5.161.69.57:8088/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2496-56-0x0000000000400000-0x0000000002421000-memory.dmp
    .exe windows x86


    Headers

    Sections