General

  • Target

    2724-1-0x0000000000400000-0x000000000041B000-memory.dmp

  • Size

    108KB

  • MD5

    8728507f6309c98eedebcf292c6d2ba1

  • SHA1

    a45b15d1b55c1e26b48e2d9589297521d599ed69

  • SHA256

    d75a26c231bd280a4221507ac505493ebb58b1ff485a573f9f4a69971e240c8c

  • SHA512

    b7371a283830cf61ccef89d7ba2ba8e15514831aefcd9b013ff2945761ac91dd96362fac1cf5b521a4a8d5252da2ec673bf8ba65e1165d5f13d7d10dbf34b008

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mob2lqL6RJ//5O:60O9FBn6pb+tRJ/

Malware Config

Extracted

Family

raccoon

Botnet

6010219126e127aec7906aaf025fa202

C2

http://206.188.197.18:80

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2724-1-0x0000000000400000-0x000000000041B000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections