General

  • Target

    1944-88-0x0000000000400000-0x00000000007FC000-memory.dmp

  • Size

    4.0MB

  • MD5

    8ec0fab9dc00cada06aa1c79c3abbf89

  • SHA1

    363f86fb05fb49b044fb344d837fb0c9ccd3dd43

  • SHA256

    cb452c1a3cc49e2f7485a09143baa870fb1581d84ecd179c12f64a7d052559f3

  • SHA512

    fc14081bea6e93e8d4c63eec49e885576270db73c4b67a3389d0a50bd2ee9a8e8014b943068791915d283b5546f0aedeb0ab1c11ee52d3d5118e6fb1275b8247

  • SSDEEP

    6144:1cNf7P/wxlb7BmHkab34LQR88toz+lfbb1zt:aN7pFb3i688lVb1

Malware Config

Extracted

Family

raccoon

Botnet

1c40fcc370e4bf723bb6902cae839308

C2

http://45.15.156.226/

Attributes
  • user_agent

    AYAYAYAY1337

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1944-88-0x0000000000400000-0x00000000007FC000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections