General

  • Target

    2088-17-0x0000000000400000-0x0000000000492000-memory.dmp

  • Size

    584KB

  • MD5

    72a7578dc8ef2b838376fda87a3a600b

  • SHA1

    cb8b91122c20ec04926c62224de05f7624cf09ce

  • SHA256

    f9f9360bd69751e78efc8a34c41b5c236f58a4acbc75e27136a26d50fcde59f1

  • SHA512

    ab122272ed47de0fb039fb438f5d58ee37042ff534c18fcf6f71a9bd98062343338d26ded360b87e03e2851574631a9250ad8081d256b0a03e7ef094f10bb5e8

  • SSDEEP

    12288:D5ntsDk51T1v2AqWsmCsWZC6cm3mS5Osw4KT5uImXzsMli8WhoQm6f:dntso1T1v2AVZXWZZqRIUuI

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

c021300d0074689fde86c87568e215c582272721

Attributes
  • url4cnc

    https://tttttt.me/ch0koalpengold

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2088-17-0x0000000000400000-0x0000000000492000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections