General

  • Target

    2008-60-0x0000000000400000-0x00000000018F0000-memory.dmp

  • Size

    20.9MB

  • MD5

    c10450112e57b892be4fffbc56b51318

  • SHA1

    81eb998a5de68c2a92cd9115c4b9c5df05ed97b4

  • SHA256

    66e3c1419e6cd13b902792b5e32b5c25257b9c0f26b567ed3d03d04ac0c2a20d

  • SHA512

    6818f1f041d448e01c3c9aa67f237de72f13f1ffc8bbc6f34aeff9ffe6447bdc7369cd75432b8c783ac1f2944af94b8eeccf223c2abb41c4e3c26d21281fa2f8

  • SSDEEP

    393216:iJWGL9zVFWdcZil9WIG16EieCdnidQhmZ0xUYtWHm3VeSqN1muvlAmuprNbt3AcK:nGpzVpMl9u6Eibnidd1g3VeSqyubu9NO

Malware Config

Extracted

Family

raccoon

Botnet

956d6fc3a814efc12713d3f924f5f66a

C2

http://45.15.159.249/

http://79.137.202.245/

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2008-60-0x0000000000400000-0x00000000018F0000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections