General
-
Target
2016-0-0x0000000000320000-0x000000000033E000-memory.dmp
-
Size
120KB
-
MD5
293d259c503658d9ab218035e4c88fed
-
SHA1
9cafe2ccfcf65030a9979c05bbdb55b33bbdc0c0
-
SHA256
143645a8520efe9e480ceb3d94c45f0ab33eaa33fb5910e0f6bbedf3dc5140c7
-
SHA512
29cf4a3ee83c7a6570045ecfe70a84e635a16f34e0abedbaa50fbf68d7c7db71bc312d7238cad73f511bb2b7701604c8f67918a3310d7cb37b7b0af9783fc945
-
SSDEEP
3072:SANfQKMuflyKX9FBFya6mob2liL6RJ//5O:90O9FBn6pb+lRJ/
Score
10/10
Malware Config
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
Files
-
2016-0-0x0000000000320000-0x000000000033E000-memory.dmp