General

  • Target

    2244-2-0x0000000000400000-0x00000000005B0000-memory.dmp

  • Size

    1.7MB

  • MD5

    c208c4946229c7f2e261e8c1fe76c283

  • SHA1

    5ba54ad0b1e75cf6e6cccc3d3f600ee5612b1947

  • SHA256

    1ded5b5655e7337e04dc6ce1553afe08303d26ca37b3a71e449a3f81fbca4bb3

  • SHA512

    94a6387847ebddc5e450237d4e8743c53819aaff88b7ac77f36c0b3c37b6af3c0e8465cbf62f9be6a0b99e8164a63ef19928b75c13f5cb09636e67014f5c6806

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mob/llL6RJ//5OukPwH/5XGyKo:60O9FBn6pbNwRJ/Ts2pX

Malware Config

Extracted

Family

raccoon

Botnet

23bcd39984bd2ada6730faace1183641

C2

http://193.168.141.10:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2244-2-0x0000000000400000-0x00000000005B0000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections