General

  • Target

    592-85-0x0000000000400000-0x0000000001700000-memory.dmp

  • Size

    19.0MB

  • MD5

    dff585e17232a0b643dce049c2ec0630

  • SHA1

    aae0b1c8d7902e7a04f0d50ca808279a91a6d3d8

  • SHA256

    58af3ba3649281a215586c897fb6e582c4a876e21e600663441f43e246c0b3ed

  • SHA512

    c38d4ab187eaf9e7845b0a3e4a4aef8d3939f98d1e526db397c0b0262990a0674634b27b020e6688ca44c7e8184b830738e621ddd537cfcce786c8b6bc40bc13

  • SSDEEP

    393216:KG8oaNyheDtOf5m2ABd2QpcQm3aTZnsQGkzqcFplweWW08NH:VoNr5Of5m2AeQpcQm3BIplwTM

Malware Config

Extracted

Family

raccoon

Botnet

d4dfe058bb722373a292317097b425f0

C2

http://37.49.230.54

http://45.143.223.133

Attributes
  • user_agent

    AYAYAYAY1337

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 592-85-0x0000000000400000-0x0000000001700000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections