General

  • Target

    1980-75-0x0000000000400000-0x00000000015FA000-memory.dmp

  • Size

    18.0MB

  • MD5

    f12c5a3559d1fb2bdb1feabf1b4b650e

  • SHA1

    28205af3b44718db90fbaa36bc64c59ac043f3b2

  • SHA256

    3accb1f8667f6ae5b659181c01437b77dae382fd82cb4776cff7446eefae2e71

  • SHA512

    b1c7c73f82ad27ee514b38f8fdc63fb372ec6e8257c0b51148c57c78af70bb3bb3a5fcafb4d7145a3f9a0489e2c7ae60395536343e2d30e89b7ef3e2255c90b1

  • SSDEEP

    393216:JHFUhWQdWmZjuvCknsO5k1l8TfsXxnhZWWW69yy5psfzAL:uWQh9uvCU0fWmxnhYj6AyYA

Malware Config

Extracted

Family

raccoon

Botnet

d44ad6b9c89ee584aec42cb7b3600d20

C2

http://185.106.92.48

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1980-75-0x0000000000400000-0x00000000015FA000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections