General

  • Target

    1512-2-0x0000000000400000-0x000000000070B000-memory.dmp

  • Size

    3.0MB

  • MD5

    ea1fbc305faa73e4f4a4efd7f9b0ed1b

  • SHA1

    c3f33b6014f61f8c1a5dd8686cc42ed7946b17c4

  • SHA256

    70ce0ad70bf689c0d83900a6f28ae604ecd73fb56d79cb1226460a7688291b7b

  • SHA512

    be8ac42b83a147d6503ea3b1369a29be063a2bd32b080141efec93b443511216a0c59164a1b4fd786da10ae83df64f8fb30247fcb4f6f6d4a3d617c79741b36c

  • SSDEEP

    3072:yEfIr0usN5rtB+U7ITo+StITErFDYpcO0Ae7:yyttI0PthRrA

Malware Config

Extracted

Family

raccoon

Botnet

0da2e3700aa6f05465fdfc323d371488

C2

http://94.142.138.19:80

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1512-2-0x0000000000400000-0x000000000070B000-memory.dmp
    .exe windows x86


    Headers

    Sections