General

  • Target

    1632-2-0x0000000000400000-0x0000000002022000-memory.dmp

  • Size

    28.1MB

  • MD5

    bd6a534747232c5539fb28ec300038b7

  • SHA1

    9305b2b87a95e5343f38501a0da5ddc1d49ac82c

  • SHA256

    419451a1d4564d926f5ed784e6f25169388f25a5a4c77512ebff8e7f22337638

  • SHA512

    3585d955c672159fb7d03dcd3ccbf8ee5b78665fd67691b5588c69828fa5fe0bd1102408f3f842b511d6ec6908497ab8b8885779e3280f84c410ce5b2d29029f

  • SSDEEP

    786432:5Lx/AzHmyIaomxtygtzqF/x5YvhgmcTCwvTp1Ud:v/21nxzqb5Yvh62wrT

Malware Config

Extracted

Family

raccoon

Botnet

3cc68ac07bedb7cfe333e369385ec28f

C2

http://91.103.252.167:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-2-0x0000000000400000-0x0000000002022000-memory.dmp
    .exe windows x86


    Headers

    Sections