General

  • Target

    2388-12-0x0000000000400000-0x0000000001B73000-memory.dmp

  • Size

    23.4MB

  • MD5

    18a525f5c56ba08af1dfa7edc69374ef

  • SHA1

    928012f068ffe650050da55db37ade623b3ad751

  • SHA256

    46bec09b95787d55c243613765b2ae5be172b82aa7663534f9d3f5a8db75779b

  • SHA512

    f082a6617623edee95f28189008b321458729fc7d48157805056f7c4abbc16346355feea6d2adf31c9f1fb21de25aa1cd4f6307312693d204834cfdcc6bcaf5c

  • SSDEEP

    393216:pU341/R1X2TPIn7DtWJ3E9GTzDEsFLLFvuBRlnqFgPqNJxz/2oq/HQnTRTbot:QI7U3E90L5JolnxezeoZ

Malware Config

Extracted

Family

raccoon

Botnet

1adeb438cd8ab2abb4349e0ca6853b53

C2

http://94.142.138.234

http://94.142.138.235

Attributes
  • user_agent

    B1D3N_RIM_MY_ASS

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2388-12-0x0000000000400000-0x0000000001B73000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections