General

  • Target

    2668-2-0x0000000000400000-0x00000000005B0000-memory.dmp

  • Size

    1.7MB

  • MD5

    5055b0bae3ac42b9c356094b638550c5

  • SHA1

    40ed9f0d52cec07a41f034c66fd506c3d565055e

  • SHA256

    a3935561455b59ac9517690087f68171c36da707cf9d6ebfe9083e19f4f788d5

  • SHA512

    d188969f13758d1d9c032a3a28bbb85a1f5b472b24b9f1211bf7137490ed5fef2b1c21fe4258ea28e49d8b9befa626b982d0bc204a37a3266d1fb2284998ae5c

  • SSDEEP

    3072:VANfQKMuflyKX9FBFya6mobsnllL6RJ//5OdPwH/5X+NyKo:60O9FBn6pbslwRJ/u2pF

Malware Config

Extracted

Family

raccoon

Botnet

23bcd39984bd2ada6730faace1183641

C2

http://193.168.141.10:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2668-2-0x0000000000400000-0x00000000005B0000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections