General

  • Target

    2320-57-0x0000000000400000-0x0000000002B46000-memory.dmp

  • Size

    39.3MB

  • MD5

    2a6188f54fef051b2dd7c8b18dff180c

  • SHA1

    8c84942e281bc3cac3b9bbd09e060a8f660a4e73

  • SHA256

    5104ce7186223f7624223581286c70167a9d8edaeaf78dfd22264866bd3eb71f

  • SHA512

    5643dea93a99e118ee9de4d27860a857a55fce1523710e15f42aad676e1ebe16af8d9535023899a45d3d57c8a3dffddfa4c8b19ebb8b92d427df1c85200f6b5f

  • SSDEEP

    3072:YyNbF2zBvcA20LrI2GcyyOwtv/08PzPcP0K:Yyb+vc9+I2Gc7/10IzPcs

Malware Config

Extracted

Family

raccoon

Botnet

6e489b600db6a7cfd6a1b65b9a5a61eb

C2

http://5.78.111.161:8088/

Attributes
  • user_agent

    DuckTales

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2320-57-0x0000000000400000-0x0000000002B46000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections