MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 034e8e297165eeb14372eea7a7e68756e561df39b84c5be924e542a36dee7418. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 10 File information Comments

SHA256 hash: 034e8e297165eeb14372eea7a7e68756e561df39b84c5be924e542a36dee7418
SHA3-384 hash: c088731c3cefdb1ba3db62e6d69a8b45349c5b2e781ca93f0b49750a64cc9e8cba35408fb925d5c445d2308c8d85ef8d
SHA1 hash: 7264da559e9d8ea5e2078a82303ac45ee0a86df8
MD5 hash: 8cbf006774f09f7dfa5f37aeb7ede7a6
humanhash: october-uranus-ceiling-south
File name:034E8E297165EEB14372EEA7A7E68756E561DF39B84C5.exe
Download: download sample
Signature RaccoonStealer
File size:2'278'400 bytes
First seen:2021-12-29 22:05:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b985816070bef8efebdfdcd91627363a (1 x RaccoonStealer, 1 x AZORult)
ssdeep 49152:oSzTTnFM6MNqBSzTTRSzTT1eFl3h/3SzTT:oSzTTnFkNqBSzTTRSzTT1G3h/SzTT
Threatray 11'744 similar samples on MalwareBazaar
TLSH T116B5B002BBD89B6BD06E4776D037082503F2DC6662B3EB0F6A54FA6A1D737C18C11667
File icon (PE):PE icon
dhash icon 35675b5f07337169 (1 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://185.163.204.24/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.163.204.24/ https://threatfox.abuse.ch/ioc/289030/

Intelligence


File Origin
# of uploads :
1
# of downloads :
316
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
034E8E297165EEB14372EEA7A7E68756E561DF39B84C5.exe
Verdict:
No threats detected
Analysis date:
2021-12-29 22:07:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
DNS request
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fareit greyware greyware obfuscated packed packed raccoon
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Azorult BluStealer Oski Stealer Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates files with lurking names (e.g. Crack.exe)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected BatToExe compiled binary
Yara detected BluStealer
Yara detected Oski Stealer
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 546407 Sample: 034E8E297165EEB14372EEA7A7E... Startdate: 29/12/2021 Architecture: WINDOWS Score: 100 115 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->115 117 Multi AV Scanner detection for domain / URL 2->117 119 Found malware configuration 2->119 121 19 other signatures 2->121 11 034E8E297165EEB14372EEA7A7E68756E561DF39B84C5.exe 6 2->11         started        process3 file4 77 Yamicsoft_AIO_5in1..._Keygen_By_DFoX.exe, PE32 11->77 dropped 79 C:\Users\user\AppData\Local\...\Pacted.exe, PE32 11->79 dropped 131 Creates files with lurking names (e.g. Crack.exe) 11->131 15 cmd.exe 1 11->15         started        signatures5 process6 process7 17 Pacted.exe 13 15->17         started        20 Dcvxaamev.exe 15->20         started        24 Yamicsoft_AIO_5in1_v2.8_Keygen_By_DFoX.exe 2 15->24         started        26 conhost.exe 15->26         started        dnsIp8 103 Antivirus detection for dropped file 17->103 105 Performs DNS queries to domains with low reputation 17->105 107 Machine Learning detection for dropped file 17->107 109 Maps a DLL or memory area into another process 17->109 28 Pacted.exe 19 17->28         started        88 prepepe.ac.ug 20->88 69 C:\ProgramData\vcruntime140.dll, PE32 20->69 dropped 71 C:\ProgramData\sqlite3.dll, PE32 20->71 dropped 73 C:\ProgramData\softokn3.dll, PE32 20->73 dropped 75 4 other files (none is malicious) 20->75 dropped 111 Tries to harvest and steal browser information (history, passwords, etc) 20->111 113 Tries to steal Crypto Currency Wallets 20->113 32 cmd.exe 20->32         started        file9 signatures10 process11 dnsIp12 90 tuekisa.ac.ug 28->90 93 partiad.xyz 28->93 95 20 other IPs or domains 28->95 81 C:\Users\user\AppData\Local\...\Dropakxa.exe, PE32 28->81 dropped 83 C:\Users\user\AppData\Local\...\ghjk[1].exe, PE32 28->83 dropped 34 Dropakxa.exe 7 28->34         started        38 conhost.exe 32->38         started        40 taskkill.exe 32->40         started        file13 129 Tries to resolve many domain names, but no domain seems valid 93->129 signatures14 process15 file16 57 C:\Users\user\AppData\...\FFDvbcrdfqs.exe, PE32 34->57 dropped 59 C:\Users\user\AppData\Local\...\Dcvxaamev.exe, PE32 34->59 dropped 123 Maps a DLL or memory area into another process 34->123 42 FFDvbcrdfqs.exe 4 34->42         started        45 Dcvxaamev.exe 4 34->45         started        47 Dropakxa.exe 34->47         started        signatures17 process18 dnsIp19 127 Maps a DLL or memory area into another process 42->127 51 FFDvbcrdfqs.exe 61 42->51         started        97 91.219.236.148, 80 SERVERASTRA-ASHU Hungary 47->97 99 91.219.236.18, 80 SERVERASTRA-ASHU Hungary 47->99 101 4 other IPs or domains 47->101 55 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 47->55 dropped file20 signatures21 process22 dnsIp23 85 pretorian.ac.ug 51->85 61 C:\Users\user\AppData\...\vcruntime140.dll, PE32 51->61 dropped 63 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32 51->63 dropped 65 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 51->65 dropped 67 45 other files (none is malicious) 51->67 dropped file24 125 Tries to resolve many domain names, but no domain seems valid 85->125 signatures25
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2021-12-28 23:09:00 UTC
File Type:
PE (Exe)
Extracted files:
37
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:5781468cedb3a203003fdf1f12e72fe98d6f1c0f discovery infostealer spyware stealer trojan
Behaviour
Checks processor information in registry
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
prepepe.ac.ug
http://195.245.112.115/index.php
Unpacked files
SH256 hash:
df589465847a7ff3d5889d3a14070d3f440f5de1d7721024232be4d7d56803d4
MD5 hash:
9438fc8f1992593a8b6295401c337c4f
SHA1 hash:
759f66f585254b332013365ec0f8cc4e963c0e62
SH256 hash:
1032f45da46e60c23dacd53f9bd8bc08446a771d9d3e998d0fa5310cfd3fbc5a
MD5 hash:
7fd4108b3c3b9548ebdceffd15d5aba4
SHA1 hash:
0229e18275b882f60e26933c1121c44bb2c080b4
SH256 hash:
880fd499a5bdf08914069b29535d1b3451923b91d7716e5a19990d00290077d9
MD5 hash:
db46db11481ae9ed63a98a93ea9cb8e1
SHA1 hash:
1560ccea386ddc82fad961a16b42205995dc9922
SH256 hash:
60e880715cc0a94edadf579824392093fc46196ff86457fd1e874287cf4ffd57
MD5 hash:
09bfff5606e5ec11efe70b65ca16602c
SHA1 hash:
c3c13806d7ede45d7591cae2997790c184e20d73
SH256 hash:
034e8e297165eeb14372eea7a7e68756e561df39b84c5be924e542a36dee7418
MD5 hash:
8cbf006774f09f7dfa5f37aeb7ede7a6
SHA1 hash:
7264da559e9d8ea5e2078a82303ac45ee0a86df8
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Meteorite
Author:ditekSHen
Description:Detects Meteorite downloader
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:quakbot_halo_generated
Author:Halogen Generated Rule, Corsin Camichel
Rule name:silentbuilder_halo_generated
Author:Halogen Generated Rule, Corsin Camichel
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.oski.
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments