General

  • Target

    1668-143-0x0000000000400000-0x0000000000497000-memory.dmp

  • Size

    604KB

  • MD5

    4900c62e62932e8f264a5d59544c5c7b

  • SHA1

    c24a368bffa8e1e16e8a6df580fdf491d71fbbe8

  • SHA256

    dc03763c21ca4e81116e5bdab5698362a0c941332301fc95cabd6e451551c66b

  • SHA512

    7a784da137b71343675e7a7922d6481b7566bdbc264f107ce4b9224085c38f9ae9c487054e896010ed60953402b598ed36a562fbf642537e13ac68b2c0783dd7

  • SSDEEP

    6144:E0O9FBn6pbiBRJ/Xyf/STC47MSzISITTc6TD:pO9FBniinJn+4QScSIB

Malware Config

Extracted

Family

raccoon

Botnet

5e2505d8647542f05843f89ae7cd18e7

C2

http://128.140.101.125:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1668-143-0x0000000000400000-0x0000000000497000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections