General

  • Target

    1616-57-0x0000000000400000-0x000000000151E000-memory.dmp

  • Size

    17.1MB

  • MD5

    8c65033e49da2c9d352c5b9c9c380cf7

  • SHA1

    c4c4ae4acb47d09a90414899177682ca6a46650c

  • SHA256

    7b0cd827ab8ccc3218ebb4ec1c69e4c977b63b1d609fd08c1d56fd0e8b3acb93

  • SHA512

    5d779db0573b76bc5deac2d2608caa95c4f6baa8db83ff190c559b243cad6f03ac01a68f7d8f4923f2d902b061579a43a8b88f0e76c463e3f3197b4a4a5f15f7

  • SSDEEP

    393216:8rShfSZJ3AlehDDa9brpumJgRnC+Tx9x5SdkC4fQgJro+Rlz:vhfMxcehWx+RX50Bcro2l

Malware Config

Extracted

Family

raccoon

Botnet

f49765d62e02586d0fe162b5d3a934ad

C2

http://78.153.130.123/

http://212.113.119.35/

http://212.113.119.48/

http://212.113.106.218/

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1616-57-0x0000000000400000-0x000000000151E000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections