General

  • Target

    1148-60-0x0000000000400000-0x0000000001C4F000-memory.dmp

  • Size

    24.3MB

  • MD5

    5e50873666c759ee6524205b76f4c6c9

  • SHA1

    b0259448813ab35816f7d937ad5ae13134cae2b2

  • SHA256

    5a6fb388f18dc872d7101cf73b40568b1d4f8a45cdd3a838c2ef6e9cbfabf8d2

  • SHA512

    1b9b8a76f2b4101782a22a366fdacabb70471c927b1bdf3330223c58212a1d37fe46bb635f1bc9e22f88e613b89192864808f09d47dc74d2d803eb99a6038e64

  • SSDEEP

    393216:9T5rhXIFPHLPaWTSjec8ASEZuf0ogELI98/PPL7D4qsuco+RVy2E5140lqHbNUuY:55hIFPHjaWT2iRu98/PTYq31TqHT

Malware Config

Extracted

Family

raccoon

Botnet

9acc0b4b109f517573794147c09af4c8

C2

http://94.142.138.208/

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1148-60-0x0000000000400000-0x0000000001C4F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections