General

  • Target

    1052-56-0x0000000000400000-0x000000000045F000-memory.dmp

  • Size

    380KB

  • MD5

    8a1a93b4532be152722c57539defdcf3

  • SHA1

    08dcc1c10109f3597583972313c990093116bb66

  • SHA256

    5cb2f2ece2c7fdd2126a4ed31bdf6ab6fb40f0c32d0abdfa9961a77f4ce22e07

  • SHA512

    5d6f05768e0cd3dde9a7c431ab8d2d39237e2d1a30aef941570bebfcaedd1032b5f68eed15999e40765a1b8c1c6a2c8ce9739497d245fa7ff46cc5a0fa925f95

  • SSDEEP

    3072:k1EcfCXUDZI4/Y7J2OSgWj547vC28/g3xowzMCfVQxeG3ERWR3LV:MCqyJ2bgy47Eg3CLoCxvU0VB

Malware Config

Extracted

Family

raccoon

Botnet

d87b51d1771107cfddb7c7acd7727950

C2

http://147.135.62.201/

Attributes
  • user_agent

    20112211

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1052-56-0x0000000000400000-0x000000000045F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections