General

  • Target

    1624-57-0x0000000000400000-0x0000000001530000-memory.dmp

  • Size

    17.2MB

  • MD5

    dcda5757b0075ca5f9a8f4c5bb38d937

  • SHA1

    c88306ef6bd5e6076e6a25a8400f1f08624b06f3

  • SHA256

    345098098a51a54d820fd387071e3b53f6772db861b90dc4e77c02935eaa0b74

  • SHA512

    ad936b4a81441546c75c483211c937591deb9fd9e333e989ca7b73e354a0caa7f6df6d63294c209488ce80fcf6fc69319b1a918312eae76852d5414b69271eca

  • SSDEEP

    393216:GvXCi293xbva3yefUkTsfpgnXRprnBMDZbuUweYzmBMm9mDW4N:O0dvatgfpgXRpNwZbuNz2Mm9t4N

Malware Config

Extracted

Family

raccoon

Botnet

cb48012fbfeee19d22811e9062518880

C2

http://5.252.118.139/

http://85.192.63.185/

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1624-57-0x0000000000400000-0x0000000001530000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections