General

  • Target

    2204-2-0x0000000000400000-0x00000000005A8000-memory.dmp

  • Size

    1.7MB

  • MD5

    fca9345d5d66b6577a1930793bf4a43d

  • SHA1

    6707db3bc14eafb70d3096aebd3b5d7443845f47

  • SHA256

    91cb30e69b72538653e3e591a2bc58bb46792491d61915a603407d261d15636a

  • SHA512

    1878247fc8a60c77edaf7dbffe255d5e3bd39d725ecc87d884f81d0513f71beeeae8ecb8705fce18420bc065b45ac3260639ee41863960e6e8fdbd72b4c8af99

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mobHl6L6RJ//5OGYEJLO+AZCfsKJEd31E5J8T0:60O9FBn6pbF9RJ/NVXAZCfrJ231if

Malware Config

Extracted

Family

raccoon

Botnet

eaebb7975ac4bf6a61b8cae8669155f5

C2

http://85.209.11.78:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2204-2-0x0000000000400000-0x00000000005A8000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections