General

  • Target

    1764-64-0x0000000000400000-0x000000000041F000-memory.dmp

  • Size

    124KB

  • MD5

    a5289dba0d2a68c060100b61134dae27

  • SHA1

    dd3f5cbb581612625d2900e05c35851e435792bd

  • SHA256

    c2ce7bd5cf2269bc23428f36f859f7c7ae920f805ace0d550082078d32ba20d4

  • SHA512

    7cddce336b947a126f93273390e69c3667ab8c07fb71d9a72b9c4256a04cb4cbbb8e23924cf2617bc1007f747a55afce0a4420235913f03d5ad3400254f1f0f1

  • SSDEEP

    1536:/ja4qX8uFJQvccqJ4QFn8XwcWwH7Yq8BG8TcdayFtvhV732+oOl8s4PBqZ1zObEg:/jYPQRQmr8YLNL6dzjPAvZjy5g

Malware Config

Extracted

Family

raccoon

Botnet

e95772f33c1380903e60f27abd282f9e

C2

http://212.113.119.73

http://212.113.106.211

http://212.113.119.69

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1764-64-0x0000000000400000-0x000000000041F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections