We describe the process and results of reverse analysis of malware Raccoon Stealer v.1.7.3. We describe instruments of analysis, the process of code analysis, unpacking, getting of original code. We describe the process of code analysis, construction of malware working algorithm. We describe recomendations for defense from Raccoon Stealer.
Keywords: Reverse analysis, reverse engineering, malware, code analysis, debuger, disassembler, hex redactor, database, browser, information security