General

  • Target

    852-57-0x0000000000400000-0x0000000001516000-memory.dmp

  • Size

    17.1MB

  • MD5

    31d99b17c25a19a3b0ec5be98f079e3a

  • SHA1

    7c420f1bf0a2baff8b3d62aa892cbccbd27c212c

  • SHA256

    ba007f592f1e19a8166ef7dd6c01baca3c0dc53bc78890b855fb7e71a274cccc

  • SHA512

    d3efced987c1d32bba6516a043e186890050e644e6acb0a76c5ec4a9d3b129c25c415fcfb87e7ac58ad2e2eb52d816c4a079aa9f3a833fb6496b516067b23d1e

  • SSDEEP

    393216:ntIl9MpPdS03kKTJ0B+sZRHuxYXI51m+bXSjYJbPb0C:hP3kJNH/A1mcX1PAC

Malware Config

Extracted

Family

raccoon

Botnet

b976426d932f4197e7f31543c89444ff

C2

http://51.81.160.184/

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 852-57-0x0000000000400000-0x0000000001516000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections