General

  • Target

    1532-35-0x0000000000400000-0x000000000041C000-memory.dmp

  • Size

    112KB

  • MD5

    58684d599079dda043b281010a159890

  • SHA1

    fa8f5d12168b06fb83a76723a431d013c85181f6

  • SHA256

    d886f5be474537f685dd370c0e0cae4879484fcb020a372c286efaa4ab717a2c

  • SHA512

    52a714596e439c91e5e832a6e17241d26cec322bc1dbe8bf9645fe136ef6c558fdf2a230c884c075cc186c0be93fbe5e6d0b1465f5a44cd6757c63a18866bfb3

  • SSDEEP

    3072:RANfQKMuflyKX9FBFya6mobUl5L6RJ//5OG3Sj:e0O9FBn6pbg8RJ/93w

Malware Config

Extracted

Family

raccoon

Botnet

5e2505d8647542f05843f89ae7cd18e7

C2

http://65.109.2.42:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1532-35-0x0000000000400000-0x000000000041C000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections