MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a9edd7cee5010a9f5aa39bc0be68f8738fa6a537cafd5d07620be35f7126fb95. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: a9edd7cee5010a9f5aa39bc0be68f8738fa6a537cafd5d07620be35f7126fb95
SHA3-384 hash: 76854a35151dd0ec62b9c24ea9a55e6f54bfe042fa847e8e7bcad4525a3da43fd8c1775fc0089af070160d63a8eecf0d
SHA1 hash: c7489db36974addcbb711aefb4d9c9a8475c45a6
MD5 hash: 22b0e4d2795842ca55381be2564911d5
humanhash: connecticut-zulu-summer-vermont
File name:A9EDD7CEE5010A9F5AA39BC0BE68F8738FA6A537CAFD5.exe
Download: download sample
Signature RaccoonStealer
File size:552'448 bytes
First seen:2021-08-13 23:56:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (235 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 12288:SjtSQJCeGEOfoSrkIit/qA7FAQuXfmZG9X6AxKQAk:SjtLA91f3kX/qZQuXf79K8KQA
Threatray 1'804 similar samples on MalwareBazaar
TLSH T115C4126045005C90F0648A32EF3E2EFF685691F1DDDE160A3B0EED4BDEFA5422A5391E
dhash icon 96deeedec6f6dac2 (2 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://45.153.230.19/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.153.230.19/ https://threatfox.abuse.ch/ioc/185490/

Intelligence


File Origin
# of uploads :
1
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
A9EDD7CEE5010A9F5AA39BC0BE68F8738FA6A537CAFD5.exe
Verdict:
Malicious activity
Analysis date:
2021-08-13 23:59:35 UTC
Tags:
trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt to an infection source
Connection attempt
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Sending a UDP request
Query of malicious DNS domain
Sending a TCP request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-01-05 03:26:00 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:93f8b7c053c38cf658e833ccd257c4cb9233760d stealer upx
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Raccoon
Raccoon Stealer Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
b53e52f649a217c0934d4578d05d8650489bcc02a18d7d99030f73320c18724d
MD5 hash:
e7eb5e5b3a52d9d3893eee2e341c9678
SHA1 hash:
c5dd761902b71f658905ed79f5df1a8170433b18
Detections:
win_raccoon_auto
SH256 hash:
f1a1dfc5171412f528d7c516cc726d05320ede0b4a551b016ad06733823f1cda
MD5 hash:
6fd35a2628da972f772812a05c88aa4f
SHA1 hash:
14d15766c812446cce7568ded8e05b46980ded8a
SH256 hash:
a9edd7cee5010a9f5aa39bc0be68f8738fa6a537cafd5d07620be35f7126fb95
MD5 hash:
22b0e4d2795842ca55381be2564911d5
SHA1 hash:
c7489db36974addcbb711aefb4d9c9a8475c45a6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments