General

  • Target

    2212-114-0x0000000000400000-0x0000000000417000-memory.dmp

  • Size

    92KB

  • MD5

    a64a6548d0af371f8ccf0619cf90a73e

  • SHA1

    97413032e1917bde131c0f1de1b51fcd08fb8436

  • SHA256

    51e7e1102eb8e411bd043c86a3938591516c0affa8dd1985d6c2e5c2ef6d0957

  • SHA512

    6c2fc5cde5f1f783d9517eb6462bd43f7f3b474e93066615a22bad4d5dc44b43212c0f9b9573b85a0bc93f73ef5c357f15b86b1d1f68ffd91a8cfe0e5f2f130e

  • SSDEEP

    1536:7MDtfn4xngxeMcBWaiUTyBS4/HXdS34WgPhZIK4wfAet27B8nFQ2Xxubl:oBfnbROWai0yBS4/Z55x4iAV7mFrXxuJ

Malware Config

Extracted

Family

raccoon

Botnet

8c02f5edc9bd60a9dac0ee41df0c95a1

C2

http://91.103.252.217:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2212-114-0x0000000000400000-0x0000000000417000-memory.dmp
    .exe windows x86


    Headers

    Sections