General

  • Target

    2292-141-0x0000000000400000-0x0000000000E2C000-memory.dmp

  • Size

    10.2MB

  • MD5

    93d808b020b8bebd5a8ad4df273336e9

  • SHA1

    773b972f535fe6d2a948a12570536b6695f7a55e

  • SHA256

    7ab95def1921fea297744c86e0f7488a9a65a5595f5046c02d4a644fe057c02d

  • SHA512

    32de6b2c542e7ff50b11c8cb292ef28864038972f0418424b0c547bef830d045493832484fb4555bc64481897029868f6de784eaadaeec546249d5c578016be7

  • SSDEEP

    196608:6c8HD4cIq05jo6z5XyJZu6PV8cwFvHYMaHw+KGO5S0usxHhfT1y/DOuaBCkwQ:b8jGKi5XWDuTOHeGOc0ZHh71Vuhkw

Malware Config

Extracted

Family

raccoon

Botnet

8af62006e560c2cd0b274cc755d1a18a

C2

http://146.70.78.5/

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2292-141-0x0000000000400000-0x0000000000E2C000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections