General

  • Target

    5048-19-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    dbc3105253ca77a992aa01647fd7104f

  • SHA1

    b449097d073beb2fd94289779d463c2b76695b3e

  • SHA256

    f0460bea5251f38141c9b83e02133b84059c7c921a9b8067de9bbe19cc9c54f7

  • SHA512

    4316a1ea15fe574f4e4cb160d40f6bde9a5c75a74c9bd51dc7f5c7e516ed2f7d18eb86c60d28599c51e0bca36e17d6885fe023494a20141aa2d0a9cec61c419c

  • SSDEEP

    1536:KX0PI6ORWFPekAZZ0XCkSBIPV1Fn1p06QcKUp3G3FqH:9PI6GWpeVsXCLMrxbQOpW3FqH

Malware Config

Extracted

Family

raccoon

Botnet

2637bf45ccfc8a2d57025feab0be0b31

C2

http://45.14.244.72:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5048-19-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections