General

  • Target

    2500-1101-0x0000000000400000-0x0000000000418000-memory.dmp

  • Size

    96KB

  • MD5

    43db7121e02299ebff3168a3b0100429

  • SHA1

    3afbb2379f2bc74d256be98f69496ae6dae21198

  • SHA256

    fe876c14fb838246d6f6b9efaec1453e7b628978fe690f865cf8602b80e53f4d

  • SHA512

    fb0d7a383941a25f66aaedb76ef8e8871a0f3d176d207a600b18fb7aed08ac52969b671cb9c599aaeb8c22870479b73c3b44128752f4296a388408648c70d9fc

  • SSDEEP

    1536:BJBM2XPrkZG0OPDvQapPsfvQ2LJ0naCvMq81wUSCL7QXT4HPFYS2mO:BJBM2XPrQEDoapPv2Lma09fE7cceS2mO

Malware Config

Extracted

Family

raccoon

Botnet

071a7b18a42c1cd94de2fc5bb0bbcaf2

C2

http://193.142.147.59:80

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2500-1101-0x0000000000400000-0x0000000000418000-memory.dmp
    .exe windows x86


    Headers

    Sections