MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 01f4e7e10bb524b04e6c8e731f51b600ad5948e1001531b05df57eb3c5f2d0ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 7


Intelligence 7 IOCs 1 YARA File information Comments

SHA256 hash: 01f4e7e10bb524b04e6c8e731f51b600ad5948e1001531b05df57eb3c5f2d0ef
SHA3-384 hash: 54659e36c789a4f643f95d19f3b41de0c0575e42d48394edfb105b73812e4511531a7c7c9e470ce0347a2a257ea5ad6c
SHA1 hash: f58415b8c6eb9d3bdbd8661423eb00c67d8411c0
MD5 hash: f69bb2af3dbb3fac27f3cfffddf2993b
humanhash: tango-coffee-sixteen-july
File name:F69BB2AF3DBB3FAC27F3CFFFDDF2993B.exe
Download: download sample
Signature RaccoonStealer
File size:4'536'062 bytes
First seen:2021-09-03 14:16:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xrCvLUBsgD5dxEZ8Wj2e7y28ya45lsTBsMl1HU/P6nh8UJROWVmX6:xQLUCgVdDs75FaSlQl1HKPwhpRO96
Threatray 483 similar samples on MalwareBazaar
TLSH T1CC2633013582C8FFE3415572A988BBBDA23ECBE505311E4B2356EA9A1F7CC43A31655F
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://94.158.245.24/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://94.158.245.24/ https://threatfox.abuse.ch/ioc/215080/

Intelligence


File Origin
# of uploads :
1
# of downloads :
255
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
F69BB2AF3DBB3FAC27F3CFFFDDF2993B.exe
Verdict:
No threats detected
Analysis date:
2021-09-03 14:19:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Connection attempt
Sending a custom TCP request
DNS request
Running batch commands
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Sending a UDP request
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 477322 Sample: 6Wn3W5gOWd.exe Startdate: 03/09/2021 Architecture: WINDOWS Score: 100 121 149.154.167.99 TELEGRAMRU United Kingdom 2->121 123 94.140.114.57 NANO-ASLV Latvia 2->123 125 5.230.67.97 ASGHOSTNETDE Germany 2->125 145 Antivirus detection for URL or domain 2->145 147 Antivirus detection for dropped file 2->147 149 Multi AV Scanner detection for dropped file 2->149 151 14 other signatures 2->151 13 6Wn3W5gOWd.exe 18 2->13         started        16 rundll32.exe 2->16         started        signatures3 process4 file5 109 C:\Users\user\AppData\...\setup_install.exe, PE32 13->109 dropped 111 C:\Users\user\AppData\...\Sat04c6bdf900.exe, PE32+ 13->111 dropped 113 C:\Users\user\...\Sat04b0aea94c969aef.exe, PE32 13->113 dropped 115 13 other files (2 malicious) 13->115 dropped 18 setup_install.exe 1 13->18         started        22 rundll32.exe 16->22         started        process6 dnsIp7 127 172.67.142.91 CLOUDFLARENETUS United States 18->127 129 127.0.0.1 unknown unknown 18->129 153 Adds a directory exclusion to Windows Defender 18->153 24 cmd.exe 18->24         started        26 cmd.exe 1 18->26         started        29 cmd.exe 18->29         started        37 8 other processes 18->37 155 Writes to foreign memory regions 22->155 157 Allocates memory in foreign processes 22->157 159 Creates a thread in another existing process (thread injection) 22->159 31 svchost.exe 22->31 injected 33 svchost.exe 22->33 injected 35 svchost.exe 22->35 injected signatures8 process9 signatures10 39 Sat0474d386f5494e4ae.exe 24->39         started        179 Submitted sample is a known malware sample 26->179 181 Obfuscated command line found 26->181 183 Uses ping.exe to sleep 26->183 189 2 other signatures 26->189 44 powershell.exe 25 26->44         started        46 Sat045c58e4987b928d.exe 29->46         started        185 Sets debug register (to hijack the execution of another thread) 31->185 187 Modifies the context of a thread in another process (thread injection) 31->187 48 svchost.exe 31->48         started        50 Sat04b0aea94c969aef.exe 37->50         started        52 Sat049cec745dbb0.exe 2 37->52         started        54 Sat041c77a5398.exe 37->54         started        56 4 other processes 37->56 process11 dnsIp12 131 37.0.10.214 WKD-ASIE Netherlands 39->131 133 37.0.10.237 WKD-ASIE Netherlands 39->133 141 10 other IPs or domains 39->141 97 C:\Users\...\x8U92Ci61XAWhPZ1KZLK1io7.exe, PE32 39->97 dropped 99 C:\Users\...\v4DUaOgkVTQXzPmTLXm8_kZK.exe, PE32 39->99 dropped 101 C:\Users\...\to7qfEXTHM6Y7j0rki475qYj.exe, PE32 39->101 dropped 107 45 other files (38 malicious) 39->107 dropped 165 Drops PE files to the document folder of the user 39->165 167 Tries to harvest and steal browser information (history, passwords, etc) 39->167 169 Disable Windows Defender real time protection (registry) 39->169 58 cmd.exe 46->58         started        60 dllhost.exe 46->60         started        135 34.97.69.225 GOOGLEUS United States 48->135 171 Query firmware table information (likely to detect VMs) 48->171 173 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 50->173 175 Checks if the current machine is a virtual machine (disk enumeration) 50->175 62 explorer.exe 50->62 injected 177 Creates processes via WMI 52->177 64 Sat049cec745dbb0.exe 52->64         started        103 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 54->103 dropped 68 LzmwAqmV.exe 54->68         started        137 208.95.112.1 TUT-ASUS United States 56->137 139 8.8.8.8 GOOGLEUS United States 56->139 143 3 other IPs or domains 56->143 105 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 56->105 dropped 70 WerFault.exe 56->70         started        file13 signatures14 process15 dnsIp16 72 cmd.exe 58->72         started        75 conhost.exe 58->75         started        77 rundll32.exe 62->77         started        117 104.21.70.98 CLOUDFLARENETUS United States 64->117 119 192.168.2.1 unknown unknown 64->119 89 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 64->89 dropped 79 conhost.exe 64->79         started        91 C:\Users\user\AppData\Local\Temp\3.exe, PE32 68->91 dropped 93 C:\Users\user\AppData\Local\Temp\1.exe, PE32 68->93 dropped 95 C:\Users\user\AppData\Local\...\Chrome3.exe, PE32+ 68->95 dropped file17 process18 signatures19 161 Obfuscated command line found 72->161 163 Uses ping.exe to sleep 72->163 81 Piu.exe.com 72->81         started        83 findstr.exe 72->83         started        85 PING.EXE 72->85         started        process20 process21 87 Piu.exe.com 81->87         started       
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-21 08:07:59 UTC
AV detection:
35 of 46 (76.09%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:vidar botnet:2d1fa8a1b3c606f582add005087c86b4317a0710 botnet:706 botnet:937 botnet:b8ef25fa9e346b7a31e4b6ff160623dd5fed2474 botnet:pub1 aspackv2 backdoor evasion infostealer persistence stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
viacetequn.site:80
https://romkaxarit.tumblr.com/
Unpacked files
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
1d53a1741021d44478a5beea3fe9c2dad1d06f432f241acb36e6b9b31660c814
MD5 hash:
bbf07901d12da487eb9edc8a8f1d33c8
SHA1 hash:
f5564a97cc708c758acbb658332a41997d89aa7a
SH256 hash:
48393824b9d527437523fdfa39277741b6de9aeb2d0ab5b4658c8fc810d8285f
MD5 hash:
8bd9f53743d36354099b2dad981c18d1
SHA1 hash:
f041ffa5ad8810ce562e568d10cbd19dfb83fd82
SH256 hash:
ad05101ae1ec45000fcdc1b0affa4bdbe8527679648341214a79e0bf1fb15e09
MD5 hash:
aee8e3e9464a5102f590bc00742971c9
SHA1 hash:
c6638b9de9601a52c2e6f249e2e8842f58247808
SH256 hash:
8a77dd50b720322088fbe92aeba219cc744bd664ff660058b1949c3b9b428bac
MD5 hash:
d1d4b4d26a9b9714a02c252fb46b72ce
SHA1 hash:
af9e34a28f8f408853d3cd504f03ae43c03cc24f
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
a575f4eb4a0b31ccf16a0367b376874479171cad9eeaff778fc4559c0822d22f
MD5 hash:
5c18abdf10111e05706c983434471d55
SHA1 hash:
8cb87a3477b9765c9600aa30925b99c11625a6eb
SH256 hash:
b73dce9f851fc39502985d4d119de21d843c03226f48984594a8e7467b48aefb
MD5 hash:
1950a92d574528bacc2d384511f80234
SHA1 hash:
3a65ba990cb4d6c1916a5d1aaa76af5b6fe9f840
SH256 hash:
aeb8a08cd772d633eab56a208076eb065ca4a37a41b6cb18d29c0ff8f12ffe2f
MD5 hash:
5c65d630abc82047e69fc0e6a0bbabb5
SHA1 hash:
c606f9a243ac4f50559ea7020da0e7515b5c60b3
SH256 hash:
c4d301245dec8b1f4a72eaace17da94d85224a93823e0731633cfd24b721edc0
MD5 hash:
5844399495c0b9e529421042c654a107
SHA1 hash:
1c7b33bd286244773fd80c279f2d02feffbbddda
SH256 hash:
bd590d36387653f6830b5444c35645c56889d3eb3942fae832b765b8da27dbf2
MD5 hash:
8c5fb85313a4c6c49975780d03bd46d3
SHA1 hash:
58202961f57dcc7c81346975e605e9ad9cb73403
SH256 hash:
d2f776eab0b8bb0c345d70d85b60fe209f7e276785702f3d2477d6bae82aa31f
MD5 hash:
6387b32fc95520790d9c98fe94081c53
SHA1 hash:
53a9338527fabb852c49b196eb165cce73f0bc88
SH256 hash:
dbe6d1808847debd8dbd448ee453844d84e11d5b7d0355317cb26549c1320f58
MD5 hash:
2f9afb04e6d7a19dfad9adf68772e3bb
SHA1 hash:
057344a65f470793217bf2497cdca9f7a6835661
SH256 hash:
01f4e7e10bb524b04e6c8e731f51b600ad5948e1001531b05df57eb3c5f2d0ef
MD5 hash:
f69bb2af3dbb3fac27f3cfffddf2993b
SHA1 hash:
f58415b8c6eb9d3bdbd8661423eb00c67d8411c0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments