General

  • Target

    592-133-0x0000000000400000-0x0000000000497000-memory.dmp

  • Size

    604KB

  • MD5

    facf301101d03b13b6b9a3a8dde13797

  • SHA1

    12270cb66755e56b7942d27c8d5d9c0addcaab32

  • SHA256

    f1b41e0483f8dbd60e2b30d949a2eb9cd75e55651ae99c653cde4ec0815eb44b

  • SHA512

    b6d63b2966672bed7612e8a4ef85d1572c348304b4870e8ca782785a950998d25084e64f6af1dadf9c36c85d09d13a08088f92d649ad76102918f59998d9ce27

  • SSDEEP

    6144:E0O9FBn6pbJBRJ/Xyf/STC47MSzISIxaTc6TD:pO9FBniJnJn+4QScSIO

Malware Config

Extracted

Family

raccoon

Botnet

5e2505d8647542f05843f89ae7cd18e7

C2

http://128.140.101.125:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 592-133-0x0000000000400000-0x0000000000497000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections