General

  • Target

    2600-62-0x0000000000400000-0x0000000000497000-memory.dmp

  • Size

    604KB

  • MD5

    b2b5f3ed1a43e16e1d595f28d43983e7

  • SHA1

    f378f38832be73be6c3794ab000fb2feaadd9ae1

  • SHA256

    1b59d88b2cdb228affc441d8ea3b08d8023b4e2b0eb7727d52a576949427d1c1

  • SHA512

    9703f6297f305873985971c2047fea70d4ed3c3bc88834315da15874e3dda3ec652f61ded71c16fe91a48a8039d89d91fd7708cd220c378c41ada4382a8154e2

  • SSDEEP

    6144:I0O9FBn6pbYlRJ/lf/STC47MSzISIrTc6TD:VO9FBniYzJc+4QScSI5

Malware Config

Extracted

Family

raccoon

Botnet

e4daa7b0c0cb28d4aaaa1b370f3f071b

C2

http://149.248.79.83:80/

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-62-0x0000000000400000-0x0000000000497000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections