General

  • Target

    2176-2-0x0000000000400000-0x0000000000493000-memory.dmp

  • Size

    588KB

  • MD5

    dc8851fe8e1f7d533405ea14ba4ef355

  • SHA1

    e4a0455e155aa4bd74b250b9fc2a82a00986c37e

  • SHA256

    98b591ef3553ecfc9de82e35ea26ca49e14cea732708fcb6f1030bddfb8edce7

  • SHA512

    b380ddc5fab1e1f5c64ecd23809d60dca5e64372e52c9ccbfb2c8223fb33ad121425ae3ab79371c72a8cfd892bd747ca010c392971c40debcd8a98926885f49f

  • SSDEEP

    6144:60O9FBn6pbrLRJ/9VXaEa2AzTkb0xLWay+B2SlZY2TJEyZwFhbQZOftG5x6nAg9v:HO9FBnirNJGLBf2SfZYbuOtG58nAnbc

Malware Config

Extracted

Family

raccoon

Botnet

17ac5bf38b1a6b1d4173afdd8ddb90cf

C2

http://176.113.115.213:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2176-2-0x0000000000400000-0x0000000000493000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections