General

  • Target

    1312-153-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • MD5

    723761a6f1b017453567818aacaba592

  • SHA1

    474a54d904d17cdbeb24ccd1cd2e66512f292cd5

  • SHA256

    3ca5bca198a393ce27ede543d9c38a6df6e7e6f57a98453b81a6eeb7c1628aca

  • SHA512

    173239c9c1be69ee2339500786d18d0a0ded9a4abad20632112f870fb3be9261b052bbc054410cbd26d8621ba3e1e3448a7683fdb9279e78b5093820a70fcee6

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW8mskU:T2t4cybq56O84

Malware Config

Extracted

Family

raccoon

Botnet

74b8b770a65f8e339e8f029b78098a50

C2

http://89.23.107.239:80/

http://49.13.18.115:80/

Attributes
  • user_agent

    DuckTales

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1312-153-0x0000000000400000-0x000000000040F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections