General

  • Target

    1868-1-0x0000000000400000-0x000000000041B000-memory.dmp

  • Size

    108KB

  • MD5

    ddeda7132fae551aa3ab621c07f911f7

  • SHA1

    d85fe9f03d789649b80cefcfcc277f48b414a557

  • SHA256

    d5878f2bd8e246e466e882ea6a3bf17a8bae18129e606aa4fa939d9cc34e038b

  • SHA512

    aecc96296b41e07f1acce3320e36d67fdfdcabf066808758d7f05239a91e7710b68b890f70b88f5176f2fb7fb4272ed9461a55e92b438be46f67165982aa19f0

  • SSDEEP

    3072:yEfIr0usN5rtB+U7ITo+StATEsFDYpcO:yyttI0PtZM

Malware Config

Extracted

Family

raccoon

Botnet

398635304234b3332a09e0b2978232b2

C2

http://89.23.98.212:80

Attributes
  • user_agent

    GeekingToTheMoon

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1868-1-0x0000000000400000-0x000000000041B000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections