General

  • Target

    2044-54-0x0000000000400000-0x0000000000995000-memory.dmp

  • Size

    5.6MB

  • MD5

    60fa1d782e2a64a3fa4d422453e92ef7

  • SHA1

    9f359a5afe07577f20729369aca93497a3f82a4d

  • SHA256

    05cd6d37ef2e372884685f4b1b958af9d456e1773146cab5f42189a5cf1607df

  • SHA512

    5260276fdecc0bbd4283c773a199f0c6cfaad28d5878761fd50489948ba2c03876fd86c5f195d928838edeec2f346d012b4bc14f3c8cab2b84ee7506d492fddf

  • SSDEEP

    98304:yqOaazb+BtnmiTH87kOEW8p98zFHg4Y9Xee17prBUY4Pp8czmZ:LcAtJL87QW73Y9XfrS

Malware Config

Extracted

Family

raccoon

Botnet

649e6b3c1394379eb87a5100c70e94fa

C2

http://85.208.107.18

Attributes
  • user_agent

    AYAYAYAY1337

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2044-54-0x0000000000400000-0x0000000000995000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections