General

  • Target

    2376-56-0x0000000000400000-0x0000000001B44000-memory.dmp

  • Size

    23.3MB

  • MD5

    8e486c3ba8efded80537fc39d83c36b9

  • SHA1

    bc7542a099c868601c025d9cc55ac748fdb96519

  • SHA256

    ff534ba757c496964831b6cd492f9fa856b9fc2c07460f9cf1e0da63bda9fcde

  • SHA512

    6508c48fc918974762f4d849a773b9e6cee3f1a2ce051394261149646846c091db686858d48f9e5739800ed6db89746cab7cdbf897df338aab8de966e8da8c0b

  • SSDEEP

    3072:YyLvAxebfMhFG8yyrHe6PKMFrXh5ibGflYkLePK0c6jM:YgvA8fcBTJy+bhaM9qK6

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

Attributes
  • user_agent

    DuckTales

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2376-56-0x0000000000400000-0x0000000001B44000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections