General

  • Target

    1696-78-0x0000000000400000-0x0000000001C68000-memory.dmp

  • Size

    24.4MB

  • MD5

    ff5df3f1233ec672fea9da2550de4212

  • SHA1

    eb5e9f41d6eb46a6649b155071d3772b2fff6753

  • SHA256

    39be2861361c56981ded16c0e46b61ba96d45ce5b6ad5fd256ffc7da33ceb6ad

  • SHA512

    cfbad22f0e549baa904c2b630b1849cbaeda8fd7f915a0e36b7414361abf93aa190a35d255f3f92b5e74f23b181efe56bc3acd69d4de82a1f61a238f8d54881b

  • SSDEEP

    393216:sg57Bo4rDtpZI0a52mS+bQ4K+RCv5CJZZR94k0PWu32Fp9oGVc3GoeqEYEOrN:ldVZQ5s+WOaCJZZYk0Pn32JugqHEOJ

Malware Config

Extracted

Family

raccoon

Botnet

b6f736facac3e28190c1e587d9487777

C2

http://83.217.11.10

http://83.217.11.6

http://45.9.74.69

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1696-78-0x0000000000400000-0x0000000001C68000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections