General

  • Target

    2596-21-0x0000000000400000-0x000000000041B000-memory.dmp

  • Size

    108KB

  • MD5

    374fa9722197b5a37e048590c1cef010

  • SHA1

    995e03757104b8092a055390e76f917f09d12674

  • SHA256

    bbb7d30959ffd2de4e91b8910fd2c01f83d7114e25fbd524cdc064dcbf8b286f

  • SHA512

    8480b0b288d4f9c70f21aed4acba2d6ac449f99fc17a781c0f80e01939d03a3fc122c10d399d5026ca0bb7e203474b7e4982df8f7f64b0340202274bd9078475

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mob2l6L6RJ//5O:60O9FBn6pb+9RJ/

Malware Config

Extracted

Family

raccoon

Botnet

1ee9bc5012c6b22fe5b669193e6dbd2c

C2

http://5.42.65.6:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2596-21-0x0000000000400000-0x000000000041B000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections