General

  • Target

    3752-141-0x0000000000400000-0x0000000000E79000-memory.dmp

  • Size

    10.5MB

  • MD5

    ed1959799162cacd8c3f611cf7dddd63

  • SHA1

    ceed5159d9ea0af4f3a8d40f191be3132daa2491

  • SHA256

    87e42107d1cf290aadcd3700702b45de10ee9b179cd546b2c6ad39c127f9945c

  • SHA512

    287ac864a5f1163ca4d54a8ff64e2adc4d85f84d597798ec685a9f2a2f3104f131cbe90d7a2347cd707ac502562b6cac75c02a4539cd131cd7281b0c2f91fddd

  • SSDEEP

    196608:2sYgovUYnAcruHkpXKSU9Huy3YQaVe/y0dUUPCml4:2sL4UYAcyHAIu0ZPCm

Malware Config

Extracted

Family

raccoon

Botnet

20006ec55ea2d79e735051ae184a687c

C2

http://83.217.11.34

http://83.217.11.35

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3752-141-0x0000000000400000-0x0000000000E79000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections