General

  • Target

    848-57-0x0000000000400000-0x00000000016F0000-memory.dmp

  • Size

    18.9MB

  • MD5

    4d295c59ff9a7eee3556953df5921576

  • SHA1

    62bf9bfc60181781b2ac37ef1ce03b2f78b8861c

  • SHA256

    054f76436d39fe978d86b436333d3f167752261e2d2848adc820106f6cec9cb9

  • SHA512

    4e18b730e4436bde7dea8373cb9e3b39ebb358863c5809be975a1797b3fbb7560d89c2f26372daf34d04f7e6127ac02040170e868edf78339670f54db0445c27

  • SSDEEP

    393216:as9+MJkBctWNyhcnt8d3jBYvoLiOs+DgISep5hUoJNrZwtJG/23XHz:ae+MwvyhQ8dz2lOJgrC5hPrZwjG/23XT

Malware Config

Extracted

Family

raccoon

Botnet

74792170e2ae861332d483b2cb2fedaf

C2

http://83.217.11.38/

http://83.217.11.6/

Attributes
  • user_agent

    AYAYAYAY1337

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 848-57-0x0000000000400000-0x00000000016F0000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections