General

  • Target

    payload_curved.bin

  • Size

    97KB

  • MD5

    b26d66e7808fb7684a747f665f184397

  • SHA1

    4a2a6c79bc80a42d14838eb60f8ef6c1ef8560b3

  • SHA256

    6e1e63045d5b794d450aaa86763ab893b18c0282838a78980e1ef1e029d35742

  • SHA512

    6043e284f8bf879fc56069ca4925e00804a3e35911db090e78a607241c4c8325cb7c71c9231603a82a735cc9633322b1ee9a7411d2270f77f28e8338dde3645b

  • SSDEEP

    3072:yEfIr0usN5rtB+U7ITo+StATErFDYpcO:yyttI0PtZR

Malware Config

Extracted

Family

raccoon

Botnet

0da2e3700aa6f05465fdfc323d371488

C2

http://94.142.138.19:80

Attributes
  • user_agent

    GeekingToTheMoon

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • payload_curved.bin
    .exe windows:6 windows x86

    0fcb7632c48018563e5af2f63681ece5


    Headers

    Imports

    Sections