General

  • Target

    2988-2-0x0000000000400000-0x0000000002434000-memory.dmp

  • Size

    32.2MB

  • MD5

    34487e6fb8d38bc39f0704dff5b2b68f

  • SHA1

    3e0c32dc2065c659892cf400fd0ee08a179be6ce

  • SHA256

    6ab1ebe5f7fd2f13e0e4649b39d994a23d9b4b220794b40c798dd946a2f01d1c

  • SHA512

    3e7edc8ac3c89c2b5bb11db74a965b8b90e532520666ead748d7df68190cbe54e7e5d2a10a46bfdc52124cf27dd04d0fb5269c83b204aaa053fd09afb3cc7966

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mobqlOL6RJ//5OISnDqXo9ubqTTZ56NTtffy6JpvboB:60O9FBn6pbK5RJ/xKWWg7i6Jpv

Malware Config

Extracted

Family

raccoon

Botnet

9c05379df6f1d02ae49f9ee18aad8c17

C2

http://5.78.80.43:8388/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2988-2-0x0000000000400000-0x0000000002434000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections