General

  • Target

    1964-75-0x0000000000400000-0x00000000015C9000-memory.dmp

  • Size

    17.8MB

  • MD5

    7fcf27b07a3366dd9bc084c0c20b1091

  • SHA1

    2f2798b5ffff868ba9f65a8a56b5b7704faf8e17

  • SHA256

    2c69a1d683583e3ec1e41e02114e2da7cf1365211c0a20c89850f8ebd713ad92

  • SHA512

    c571b6d9e2904db0f69522cd6569ef69d81b440d79593b7c97761524190363ed3eea039691de963126b37dc17bece444dd7e951e1cc4dfc275a189fd5fc0cb75

  • SSDEEP

    393216:Ojsgua/L+6AUPfxBSGkI2gVakXJextILtiKliFDc:OAg/i6hSYV3XJextUli5c

Malware Config

Extracted

Family

raccoon

Botnet

1196de9cec79da84686d34883da05a1e

C2

http://94.142.138.227/

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1964-75-0x0000000000400000-0x00000000015C9000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections