MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0838b673be73014ff6e29d784247ad3b44a794dd2134301bb25c8dd0a3f5b0ae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0838b673be73014ff6e29d784247ad3b44a794dd2134301bb25c8dd0a3f5b0ae
SHA3-384 hash: 42e63258aa88fd9689efe5b264d2c17a8a9fdaf32f4944c8afe03acbcb930d6dbe95fb5a8cc4b24ab087ef1ce6dc4b3c
SHA1 hash: 280c07c3157e28d3c0b2b452815b30191a367181
MD5 hash: 310a2b89168904f4976dc2505762c3af
humanhash: lamp-illinois-mountain-xray
File name:Scan2022-02-18_132844-64.xll
Download: download sample
Signature RaccoonStealer
File size:567'808 bytes
First seen:2022-02-23 15:28:44 UTC
Last seen:2022-04-20 09:47:03 UTC
File type:Excel file xll
MIME type:application/x-dosexec
imphash a31761b5a590c4c499d5f4a347d75c12 (23 x Formbook, 17 x AgentTesla, 6 x RedLineStealer)
ssdeep 12288:Qn/zDvGHAykH8vLW/4+8bzbBSreMdHBY4ZyrE7K3yl8PeVooA/AB2LEJZsAQPUqw:CzbGHAzHKjX1IBY4ZyrE7K3yl8PeVoo/
Threatray 57 similar samples on MalwareBazaar
TLSH T10CC48E57F7DBFAB0E6BE827A86F1851C527774620260A78F664072886D23392453DF0F
Reporter abuse_ch
Tags:RaccoonStealer xll

Intelligence


File Origin
# of uploads :
6
# of downloads :
265
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Sonbokli
Status:
Malicious
First seen:
2022-02-23 15:29:13 UTC
File Type:
PE+ (Dll)
Extracted files:
2
AV detection:
9 of 27 (33.33%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:39f537df21b7478b81f438da338d46671782b9a4 stealer suricata
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Raccoon
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments