General

  • Target

    1064-55-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    9d5ee6a7e64105e82f449382b75b5174

  • SHA1

    519235deb77a58731d3c44c55a4f7c2fd7f13ddd

  • SHA256

    fad48d397ddec4303dfd654313324c5d45e439ced3ec20d0f9bcdc53fbd8c5ac

  • SHA512

    ba92713a5c512cf03fd7bf95d211d5f7a6a4050721dab2ab0235fa160a90aa014cd87333393549d338d01b47721fd50ca8535452a60ee2ac77af9bbd1e73e972

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBlY:jky1EMd1KEWexDDRcpdUooIdYfN8z

Malware Config

Extracted

Family

raccoon

Botnet

0599d39d61f45318cfeb641935520ac2

C2

http://185.77.96.237/

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Signatures

  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1064-55-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections