General

  • Target

    1968-60-0x0000000000400000-0x0000000002185000-memory.dmp

  • Size

    29.5MB

  • MD5

    3f9129679ad9b44ab08fc568c0ffbacc

  • SHA1

    2ea31516990bd50d22cf06e360042d517128116b

  • SHA256

    4a01c7bfbc7d573dd87057d420cef4ceabc08ef0bd07d513ec4d439a9665b667

  • SHA512

    cbb82c6453415118c6f541ab9cdd7545fb557489111958d13abc79cbf25e451f45d8d0fa8f2e2e55dc5bc246de1de6c2453935fa23cc8022640cb8d5579f2d3e

  • SSDEEP

    786432:HNoj97YPMPsysrTEotEzFalH3ey2T4gyMSWZ6ezw6:HNox7J4EYEy3pnLHXeU

Malware Config

Extracted

Family

raccoon

Botnet

ee2a3d190100b91c20d8bc284238dda6

C2

http://45.15.156.201/

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1968-60-0x0000000000400000-0x0000000002185000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections