MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0bc78b7c85f56566d4a7d5698935a3b4147648588cda45ee1b320fc2489f4c4d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: 0bc78b7c85f56566d4a7d5698935a3b4147648588cda45ee1b320fc2489f4c4d
SHA3-384 hash: 151784da24b195805b2bd0eb8e33cd514444d294adbd1014291e695bfd3142a92b7ebe191a6764faa199e7dff7ebec92
SHA1 hash: d5cdf7a4ad2627c5b9e5f469aa0c3938e66b2559
MD5 hash: 283f303341b2431501dd07d03ad9f2a6
humanhash: fix-indigo-mobile-delta
File name:283f303341b2431501dd07d03ad9f2a6.exe
Download: download sample
Signature RaccoonStealer
File size:350'720 bytes
First seen:2022-01-03 13:42:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bd40b09f6fe0bc60957dc5ee4359d6d4 (2 x KPOTStealer, 1 x RaccoonStealer, 1 x ArkeiStealer)
ssdeep 6144:oSPbUNo/T5Yyc9UD2V4aArKPVcITsD/CjI0LDRKXF:oST5/dYFV4aLPiIT+CTDRKX
Threatray 543 similar samples on MalwareBazaar
TLSH T16D747C10BBA0C039F5F711F409B992A8B63E7AE15B2451CB63D52AED5B346E5EC3031B
File icon (PE):PE icon
dhash icon 60f8e8e8aa66a499 (4 x RedLineStealer, 4 x RaccoonStealer, 2 x Stop)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
104.168.44.52:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
104.168.44.52:80 https://threatfox.abuse.ch/ioc/290710/

Intelligence


File Origin
# of uploads :
1
# of downloads :
290
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
283f303341b2431501dd07d03ad9f2a6.exe
Verdict:
Suspicious activity
Analysis date:
2022-01-03 13:43:41 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
Sending an HTTP GET request
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware tofsee
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Tofsee Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Copying Sensitive Files with Credential Data
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 547376 Sample: 7tYfFkZR4N.exe Startdate: 03/01/2022 Architecture: WINDOWS Score: 100 101 Multi AV Scanner detection for domain / URL 2->101 103 Antivirus detection for URL or domain 2->103 105 Multi AV Scanner detection for dropped file 2->105 107 13 other signatures 2->107 10 7tYfFkZR4N.exe 2->10         started        13 yaihxxro.exe 2->13         started        15 bbvshir 2->15         started        17 4 other processes 2->17 process3 signatures4 117 Contains functionality to inject code into remote processes 10->117 119 Injects a PE file into a foreign processes 10->119 19 7tYfFkZR4N.exe 10->19         started        121 Detected unpacking (changes PE section rights) 13->121 123 Detected unpacking (overwrites its own PE header) 13->123 125 Multi AV Scanner detection for dropped file 15->125 127 Machine Learning detection for dropped file 15->127 22 bbvshir 15->22         started        process5 signatures6 109 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 19->109 111 Maps a DLL or memory area into another process 19->111 113 Checks if the current machine is a virtual machine (disk enumeration) 19->113 115 Creates a thread in another existing process (thread injection) 19->115 24 explorer.exe 10 19->24 injected process7 dnsIp8 91 185.233.81.115, 443, 49765, 49766 SUPERSERVERSDATACENTERRU Russian Federation 24->91 93 188.166.28.199, 80 DIGITALOCEAN-ASNUS Netherlands 24->93 95 15 other IPs or domains 24->95 71 C:\Users\user\AppData\Roaming\bbvshir, PE32 24->71 dropped 73 C:\Users\user\AppData\Local\Temp5D4.exe, PE32 24->73 dropped 75 C:\Users\user\AppData\Local\Temp\D1A2.exe, PE32 24->75 dropped 77 5 other malicious files 24->77 dropped 129 System process connects to network (likely due to code injection or exploit) 24->129 131 Benign windows process drops PE files 24->131 133 Deletes itself after installation 24->133 135 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->135 29 1A23.exe 127 24->29         started        34 E5D4.exe 24->34         started        36 43D6.exe 2 24->36         started        38 2 other processes 24->38 file9 signatures10 process11 dnsIp12 97 192.168.2.1 unknown unknown 29->97 99 file-file-host4.com 29->99 81 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 29->81 dropped 83 C:\ProgramData\sqlite3.dll, PE32 29->83 dropped 145 Detected unpacking (changes PE section rights) 29->145 147 Detected unpacking (overwrites its own PE header) 29->147 149 Machine Learning detection for dropped file 29->149 161 3 other signatures 29->161 40 cmd.exe 29->40         started        151 Multi AV Scanner detection for dropped file 34->151 42 E5D4.exe 34->42         started        85 C:\Users\user\AppData\Local\...\yaihxxro.exe, PE32 36->85 dropped 45 cmd.exe 36->45         started        48 cmd.exe 36->48         started        50 sc.exe 36->50         started        55 2 other processes 36->55 87 C:\Users\user\AppData\Local\...\4E95.exe.log, ASCII 38->87 dropped 153 Tries to detect sandboxes and other dynamic analysis tools (window names) 38->153 155 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 38->155 157 Hides threads from debuggers 38->157 159 Injects a PE file into a foreign processes 38->159 52 4E95.exe 4 38->52         started        file13 signatures14 process15 dnsIp16 57 conhost.exe 40->57         started        59 timeout.exe 40->59         started        137 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 42->137 139 Maps a DLL or memory area into another process 42->139 141 Checks if the current machine is a virtual machine (disk enumeration) 42->141 143 Creates a thread in another existing process (thread injection) 42->143 79 C:\Windows\SysWOW64\...\yaihxxro.exe (copy), PE32 45->79 dropped 61 conhost.exe 45->61         started        63 conhost.exe 48->63         started        65 conhost.exe 50->65         started        89 86.107.197.138, 38133, 49862 MOD-EUNL Romania 52->89 67 conhost.exe 55->67         started        69 conhost.exe 55->69         started        file17 signatures18 process19
Threat name:
Win32.Trojan.RaccoonStealer
Status:
Malicious
First seen:
2022-01-03 13:43:11 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
27 of 28 (96.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:arkei family:raccoon family:smokeloader family:tofsee family:xmrig botnet:10da56e7e71e97bdc1f36eb76813bbc3231de7e4 backdoor discovery evasion miner persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Arkei Stealer Payload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner Payload
Arkei
Raccoon
SmokeLoader
Tofsee
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
patmushta.info
parubey.info
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 0bc78b7c85f56566d4a7d5698935a3b4147648588cda45ee1b320fc2489f4c4d

(this sample)

  
Delivery method
Distributed via web download

Comments