General

  • Target

    2752-1398-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • MD5

    97ca6c9d069d0f53e481c8e918774501

  • SHA1

    28d6371194e3fcd9d66930bb0572f019dc1ddfaa

  • SHA256

    b40675372342d5204592884232b26aaa4b8398350adca9cb20e257d757a43604

  • SHA512

    41f799fe7da3f0f4230c274bbd370d66c85e827f4e9cf8b06ddaeb1b44a199a4a0072319cf7dba9f04763f84e6450fd2e57ee8e64d7241fd44b221f845fd56ec

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmWMmsk:T2t4cybq56OM4

Malware Config

Extracted

Family

raccoon

Botnet

fa72f4c1fbe65cee8651140fd47267ba

C2

http://193.142.147.59:80

Attributes
  • user_agent

    DuckTales

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2752-1398-0x0000000000400000-0x000000000040F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections