General

  • Target

    ce96e10fef8c98b8500c90f5fd844030355c22d66aa37a43cbebd48659bccfcd_JC.exe

  • Size

    88KB

  • MD5

    17b1136d12dfe2c774f4e4c0e86d1fff

  • SHA1

    a49bbceeb193ecf64c8e00fe251b856b5cac357c

  • SHA256

    ce96e10fef8c98b8500c90f5fd844030355c22d66aa37a43cbebd48659bccfcd

  • SHA512

    b97c341e1a553e3b4f5b8e81002d053d4d8661d32f36d7281f115a9b26f6d83c5be6642dc3f96e4a49b98215bb97c853086e23fa9ec68e81b3a453f8358cf73c

  • SSDEEP

    1536:JMDtfn4xngxeMcBWaiUTyBS4/HXdS34WgPhZIK4wfAet27B8uZQ2XxublNuk+l:GBfnbROWai0yBS4/Z55x4iAV7mArXxuo

Malware Config

Extracted

Family

raccoon

Botnet

ae10bcb793f8a68322201f142e7c4a14

C2

http://91.103.252.52:80

http://91.103.252.50:80

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ce96e10fef8c98b8500c90f5fd844030355c22d66aa37a43cbebd48659bccfcd_JC.exe
    .exe windows x86

    9a4ec0dad65bdd0dc1e6a802e6362fd0


    Headers

    Imports

    Sections