General

  • Target

    2772-33-0x0000000000400000-0x000000000041D000-memory.dmp

  • Size

    116KB

  • MD5

    570f82e6e3dca6b5d4ae6f15562963a5

  • SHA1

    d22930dd24c1721781b67d1b0cb5e000d150a149

  • SHA256

    1caad3e0d2c43789619e211ed78cb69d470a40b9ae662a0dbf62cbd4efd599ef

  • SHA512

    783b600d0540ebf7a5abc284f0d163562dc312ad28830df2915eb7216a14ff4c1888b3671d934a794d1876b0ea23fd839ebed8c79b57a0376465eac8cb82d801

  • SSDEEP

    3072:GANfQKMuflyKX9FBFya6mob2lhL6RJ//5O7:Z0O9FBn6pb+kRJ/

Malware Config

Extracted

Family

raccoon

Botnet

5e2505d8647542f05843f89ae7cd18e7

C2

http://5.75.241.110:80

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2772-33-0x0000000000400000-0x000000000041D000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections