General

  • Target

    2780-23-0x0000000000400000-0x000000000085E000-memory.dmp

  • Size

    4.4MB

  • MD5

    da90f55c2bd507ba3905f42aef5b1835

  • SHA1

    092e59636eb03cf278e0f822c8b40a8a001f2e21

  • SHA256

    19e767984163090970d07d2b2546df758598330476681716b52ba60861960b7f

  • SHA512

    b67b1f107a5374237d4323dc0396ef6430410920d8705f35f0ee51017413c3ae57704d2985fcb2264abf845ec296b9a60ce8648e57e456c5e11acc0147a6b76e

  • SSDEEP

    3072:9PI6GWpeVsXCLMrxbQNpuFqH/b4pFVqmkStswH9pQURRBVpHUZ5OeTC8L:9P8WwesMrJQNpmJkmH39pQUhjHU3T

Malware Config

Extracted

Family

raccoon

Botnet

02715ba03fc9d768ba977c72db990ef6

C2

http://193.233.132.30:80/

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2780-23-0x0000000000400000-0x000000000085E000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections