General

  • Target

    2304-35-0x0000000000400000-0x0000000000492000-memory.dmp

  • Size

    584KB

  • MD5

    d76f0963caef813ae6c537d06ef29569

  • SHA1

    b7e7a352f585c964dad9725ca22c8092627cdcfc

  • SHA256

    6b3be54729dc19a2621b0ba5baeff2e3cee360057faba2e2485b219b5e05efa1

  • SHA512

    48be26b6b6b65c25e747936401f72e475f2a0de86f4806a90d353696e653cdff8fd75583f06a2076224ea89bd34d05982b137b35c44ede2ddfad5da35bc17bff

  • SSDEEP

    12288:SkNNfKhb6z4fkvlhooipWjeWZCjyoRmCJmxLkuT+uIm3zsM0t6ERVk:bNNu6z4cvlhJigSWZSERSbk

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Signatures

  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2304-35-0x0000000000400000-0x0000000000492000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections