General

  • Target

    2280-1-0x0000000000400000-0x000000000041B000-memory.dmp

  • Size

    108KB

  • MD5

    8878470c78b855cee9ae849f39180250

  • SHA1

    7e1ed414d25d83b2f2a3c049bdc0da2720bf7d70

  • SHA256

    63ab1221f0dcc823318bd8b2aba723ddfbba31689279e1002438791bcc4ae84f

  • SHA512

    f62f308ecfb495950b27bc0a9bbdaf71a023d68a3df9f412e2e4c67d38b601c0de9396ab3978217733cc0d4c81218f883dbcbbe0b086ac3090453be4a194b902

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mob2lGL6RJ//5O:60O9FBn6pb+RRJ/

Malware Config

Extracted

Family

raccoon

Botnet

d0ee580a9fec72016dcd5f6f23bea897

C2

http://194.15.216.72:80

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2280-1-0x0000000000400000-0x000000000041B000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections