General

  • Target

    2848-10-0x0000000000400000-0x0000000000416000-memory.dmp

  • Size

    88KB

  • MD5

    0adacd5dd1e5fa00fa7d83e6f590249a

  • SHA1

    83121713e9efb9606adaa583472346ff583253b1

  • SHA256

    78c113b5eb4b44f3725b9ddebb5400efe3325af0d9492fb4b1fcd604b5c5c9f9

  • SHA512

    3c1573f2cfce02338c1cdec25bf75c81621b870eecc5225aa93ef1114726a2cdea051f705cb3d9f87be696cb5badcbf042bff616abd573246e0fe991138fc653

  • SSDEEP

    1536:KX0PI6ORWFPekAZZ0XCkSBIPV1Fn1p06QcKUp31FqH:9PI6GWpeVsXCLMrxbQOpFFqH

Malware Config

Extracted

Family

raccoon

Botnet

8401e21bbb0060afb24ce21fda90f5cb

C2

http://195.20.16.155:80

Attributes
  • user_agent

    MrBidenNeverKnow

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2848-10-0x0000000000400000-0x0000000000416000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections