General

  • Target

    1156-40-0x0000000000400000-0x000000000084F000-memory.dmp

  • Size

    4.3MB

  • MD5

    014ffb8c4c7f1948e285ceafbe3de750

  • SHA1

    e45548297c9bf66bd3b475caf61fa85fab0f4104

  • SHA256

    62dce2c59e2da67149f9b0d61d7392797ab7ba42f2bf5d5df98f2476d00505ad

  • SHA512

    a68603e8350d292e4e820361ef2d341f13aa82b5ae66fde0feb47f861bd8a923c62fe02d39014e6c2347fda57daa6fcdeba7d659fec7cd2e6ff82d7966a3a256

  • SSDEEP

    3072:9PI6GWpeVsXCLMrxbQBpuFqHziBEE6NbmM+M6iRR4fgN:9P8WwesMrJQBpm8iUyMmb

Malware Config

Extracted

Family

raccoon

Botnet

02715ba03fc9d768ba977c72db990ef6

C2

http://193.233.132.30:80/

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1156-40-0x0000000000400000-0x000000000084F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections