General

  • Target

    4584-2-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    c81ea340df7c6aff6e2e51c61cfc89f4

  • SHA1

    26bac60e24b9b97c9447a2775de3ce454967c301

  • SHA256

    063a91dbca69e8ee0891ab87b1a4e51192d49fd3677fb95d241a58eaefed6823

  • SHA512

    3291e2237e0389b053f0378dc9741fa22c59bd482e4cbe91203eb20ec296a95f8232a9a36287ec3d8d9fd4d38653fe50bad190739861250acab38cd9dce39c9e

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mobuliL6RJ//5OH77zE5ObRP5lflv:60O9FBn6pbGlRJ/o77zw83

Malware Config

Extracted

Family

raccoon

Botnet

31a59997888d26d92577b25b8030e2c1

C2

http://157.90.161.111:8086/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4584-2-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections