General

  • Target

    856-54-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • MD5

    edbf6938e53105e277ce5a78e9dc4a7c

  • SHA1

    59d7786a9339ce980123b3f6f752b0352d0975af

  • SHA256

    216186c198cb55555fd51eed1426c5e21920f1ccb8df69e8a78cca76b9aef99b

  • SHA512

    797c8cad5b6143be1ca4d57d08b77f2a942cdf985db5f95de5369f6c45f1d9f684b826dd3c6dc9a794d4cfd7232e290d6ca4f0215eac054782a833da51907ea6

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW8msk:T2t4cybq56O84

Malware Config

Extracted

Family

raccoon

Botnet

58d3d798d34797c8dc115d7871080018

C2

http://94.142.138.147:77z

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 856-54-0x0000000000400000-0x000000000040F000-memory.dmp
    .exe windows x86


    Headers

    Sections