General

  • Target

    1580-75-0x0000000000400000-0x00000000015D1000-memory.dmp

  • Size

    17.8MB

  • MD5

    b20621c614cd2b7240500af8af8f2301

  • SHA1

    07bf7d72d9b7986ffd56a67e4e17eb39ebee472b

  • SHA256

    88424f35d45f582f04d2b6010344ddd9fc50ba6cf905de6d4e07c8cae61651bf

  • SHA512

    ccd36a67c43aa34eb8920994b7feb9d7b4005efb90bdd4716d0f1d809e602d69fec8b770261448e9b8f7d3007fd28a9c4a73d2b612bcdfe959652e149ebe21f1

  • SSDEEP

    393216:V4QXRahpf0FsVo1AbV/+gReoYLOxfC65YRjzht36+VgM6Wx:5OW4/+gReoYu2RjzhxLCvW

Malware Config

Extracted

Family

raccoon

Botnet

9acc0b4b109f517573794147c09af4c8

C2

http://94.142.138.191/

http://78.153.130.157/

http://79.137.203.5/

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1580-75-0x0000000000400000-0x00000000015D1000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections