General

  • Target

    su00.exe

  • Size

    116KB

  • MD5

    a4705c801e7153285632478f77a9768a

  • SHA1

    01f96830b0de3ddfe056800610d0ba98f00502f9

  • SHA256

    982a0d1b819db754da8d7b33ec3ce845594e3efaddcc77047664243edd9fb329

  • SHA512

    7b502e03d16a55c189bb56e89303b3d47a4e1b331bf961a2d0bb8b22ffe614609351f4f1fc9bd686afec0ea7d934e8637de3bc981f19faa2ddb28c387aee3330

  • SSDEEP

    1536:Bpaiq0I2XvL/5kVvpyITHAOEH8pIZ+msXvsfJre8oJ1C7uj9mDL:BpaikE/5SppIZ+m2sfJrebJFqL

Malware Config

Extracted

Family

raccoon

Botnet

f26f614d4c0bc2bcd6601785661fb5cf

C2

http://83.217.11.34

http://83.217.11.35

Attributes
  • user_agent

    901785252112

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • su00.exe
    .exe windows:6 windows x86 arch:x86

    89766042e29aed5fce63c7340618b000


    Headers

    Imports

    Sections