General

  • Target

    1236-54-0x0000000000400000-0x000000000091F000-memory.dmp

  • Size

    5.1MB

  • MD5

    4463fd6442ad3ce7e1ff398238d4289f

  • SHA1

    c2948ae5fb737d705f638c1367cf57e2a88702a1

  • SHA256

    b6c588a09a8886e9f1d6ca62a463a9b70712886fd247f4191b33dc7a8ca595fa

  • SHA512

    3a2a55ef92384246a181c49f6b0c35b9eb980f80c19d9a5afcfc8cc7877043c398d613e73b8e61383b5403770d672fa579a2c0f5b7281a1a4e53485d09662b86

  • SSDEEP

    98304:yiElympfqBRQvVde8FivCeGDRsiScTXBgZrzyWGgRSL6O2jSk6adBNWuz+VRD0Mc:Z2y3YZFwAurmXBazEgRSSjS5aT1z+/DS

Malware Config

Extracted

Family

raccoon

Botnet

540b1db0b12b23e63e6942952aa03e47

C2

http://45.9.74.36/

http://45.9.74.34/

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1236-54-0x0000000000400000-0x000000000091F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections