General

  • Target

    932-5-0x0000000000400000-0x0000000000493000-memory.dmp

  • Size

    588KB

  • MD5

    e2c5d3015e3c0958e2851c7a8b74914e

  • SHA1

    6a61e83130ba74d5b9d939e5656cbca646642d9e

  • SHA256

    d3aab868037f1c7163ea0a4a72dd85cfdc92aae468ffc35ed98aefbe04da8226

  • SHA512

    0120a31692a6fb4180f378692db2d19dd8ab40ec1e02dd20487a2f2f858a389154faec60ce6a29d03692efa4e9e3f67c3cf0d51e9cd9db126164cdacf1799e0b

  • SSDEEP

    6144:60O9FBn6pbuLRJ/KVXaEa2AzTkb0xLWay+B2SlZY2TJEyZwFhbQXJf5G5x6nAg9v:HO9FBniuNJxLBf2SfZYbgh5G58nAnbc

Malware Config

Extracted

Family

raccoon

Botnet

17ac5bf38b1a6b1d4173afdd8ddb90cf

C2

http://176.113.115.213:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Signatures

  • Raccoon Stealer payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 932-5-0x0000000000400000-0x0000000000493000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections