General

  • Target

    776-57-0x0000000000400000-0x0000000000472000-memory.dmp

  • Size

    456KB

  • MD5

    92dc43d899b7f2f6a882cde84a3453ea

  • SHA1

    0e77f13a8fbd52c4949db378398f91a3df5454b6

  • SHA256

    466e86fe93d7af064a90b891efa0f4170005be1b7e4cde7535246f64304c6cb4

  • SHA512

    c430bfb093a3bb08b7ad0f19670493ae5dd581f22149e22f27d379f866ccf22b15fe4b92d44ffc893eb6c479bb4b22b84f46b849de39fb39d022476368299b93

  • SSDEEP

    3072:YyKoyeE2ylZtoK3RsNr/GoKBCEBdfWGUE05aGxSnJscL:Yh9hLZ3eNr/PKwMdfNUgmOC+

Malware Config

Extracted

Family

raccoon

Botnet

385573eb8024f2ce9fbfd9c1ba5d4cd4

C2

http://5.78.65.112:8988/

Attributes
  • user_agent

    DuckTales

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 776-57-0x0000000000400000-0x0000000000472000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections