General

  • Target

    1348-141-0x0000000000400000-0x000000000100C000-memory.dmp

  • Size

    12.0MB

  • MD5

    7431e1fe5f1478a4c6a3e2a1db089f7e

  • SHA1

    d2ad8a7c2ab83deca3c83d20a990be4c14c1c8ba

  • SHA256

    edcdfa38ec0218ac8e8ea609af38268acee06f70cc406d6d0a645c300dfc5944

  • SHA512

    01b99dda5bdd281a81cdf673c245ce83fa58e600a8db46bdcbe6a43e289ab8761c2a18535f46a9d3fef77d78d65d6aaa3485c513dae8c1a216b2f9f2bec6bc0a

  • SSDEEP

    393216:aigO++YEdak6h8edpjc7M4h92aGBiIsbOV:xgOqEok7ed5oM4bxn6V

Malware Config

Extracted

Family

raccoon

Botnet

b6d99cc0cf48e73c8943e8720356f837

C2

http://83.217.11.34

http://83.217.11.35

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1348-141-0x0000000000400000-0x000000000100C000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections