General

  • Target

    1712-11200-0x0000000000400000-0x0000000000425000-memory.dmp

  • Size

    148KB

  • MD5

    2995aaa4e569f96eb2307cb52d6044ee

  • SHA1

    c9a605436566b6e49c45c7988f487ea389cda783

  • SHA256

    3ad4a971d6f0af57341806ea151991088548bec2d9051a2f60102110f66e691e

  • SHA512

    4b6a92aa8c980df398f0670edd47dd82233d8c97f17ef7ea40ae3d65938ad9f69fa31e2dbde014fb378637c11e3308f8cb03ad5f6f1dba57bef4db2063cfb0fe

  • SSDEEP

    1536:GY5KCXch1xZEVQnPjUMg0XfXBOwbzR14iwelTKMTarb57b8CBm0DasBIdPKz0aex:1Xch1x0QPtfEwP/wUaR7b8CBmChIZKM

Malware Config

Extracted

Family

raccoon

Botnet

bc463b4e1d07e66361213e00312b2a5d

C2

http://45.15.156.178

http://45.15.156.177

Attributes
  • user_agent

    AYAYAYAY1337

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1712-11200-0x0000000000400000-0x0000000000425000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections