General

  • Target

    1360-134-0x0000000000400000-0x0000000000497000-memory.dmp

  • Size

    604KB

  • MD5

    e00342866f5bb48e9b1e058b7e977d68

  • SHA1

    f511b47ec8da342c5562d579ff0e76401f3eaa15

  • SHA256

    0fba664c189d262fb1ced1d1fd7f3918a3ef8d92e09c8bd7254dcd9df4a8c65e

  • SHA512

    581a650ea8e95fb25c73f4718f01d402115ccf70af5618c7298aef15521822e6c117d3463ba86b06aa6cfe40993edd0eb71d89e95351b89dafb22e272a8b4f28

  • SSDEEP

    6144:E0O9FBn6pbKBRJ/Xyf/STC47MSzISI9Tc6TD:pO9FBniKnJn+4QScSIX

Malware Config

Extracted

Family

raccoon

Botnet

5e2505d8647542f05843f89ae7cd18e7

C2

http://128.140.101.125:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1360-134-0x0000000000400000-0x0000000000497000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections