MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0c26c4bc2912317d4e104beae3e4315f7042531fa1f044ebd3da11dea4f6d974. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments 1

SHA256 hash: 0c26c4bc2912317d4e104beae3e4315f7042531fa1f044ebd3da11dea4f6d974
SHA3-384 hash: 1c0238a0668c62cdc9365e369ec75fd5aee96fe10dfe7fc7113b0328018a65c6e28c4a5757bda9292699afaadb0a8637
SHA1 hash: a25f017611c802a7c1ea0f2a3b1ec6a3cc64e8af
MD5 hash: 420d8eb15cf219dac5df1ea74aef9705
humanhash: charlie-music-magnesium-echo
File name:420d8eb15cf219dac5df1ea74aef9705
Download: download sample
Signature RaccoonStealer
File size:1'272'320 bytes
First seen:2021-12-10 14:37:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'737 x AgentTesla, 19'595 x Formbook, 12'238 x SnakeKeylogger)
ssdeep 24576:AioqKsUvUBs1bucO2SJ/NYF2nnohmP1+W2g2Fl4NPuvT:AioDMW1bu2iO+p2g2Fl4NGvT
Threatray 5'658 similar samples on MalwareBazaar
TLSH T17B45F10EA311C602FC58D7346EBB6FA012B4BAB2AD92C397FB5D1A3C446B3795C41356
File icon (PE):PE icon
dhash icon 34d4424ce8568aa2 (2 x RaccoonStealer)
Reporter zbetcheckin
Tags:32 exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
330
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
420d8eb15cf219dac5df1ea74aef9705
Verdict:
Malicious activity
Analysis date:
2021-12-10 14:39:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Sending an HTTP GET request
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint obfuscated packed stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult DBatLoader Raccoon
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to steal Internet Explorer form passwords
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected DBatLoader
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 537905 Sample: FywS42C4Uo Startdate: 10/12/2021 Architecture: WINDOWS Score: 100 81 www.uplooder.net 144.76.120.25, 443, 49824, 49827 HETZNER-ASDE Germany 2->81 83 prepepe.ac.ug 2->83 101 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->101 103 Malicious sample detected (through community Yara rule) 2->103 105 Antivirus detection for URL or domain 2->105 107 11 other signatures 2->107 15 FywS42C4Uo.exe 2 2->15         started        signatures3 process4 file5 69 C:\Users\user\AppData\...\FywS42C4Uo.exe.log, ASCII 15->69 dropped 18 cmd.exe 1 15->18         started        process6 process7 20 FywS42C4Uo.exe 3 5 18->20         started        24 conhost.exe 18->24         started        file8 59 Mnfutumjppetruxrga...lsaconsoleapp17.exe, PE32 20->59 dropped 61 C:\Users\user\AppData\...\FywS42C4Uo.exe, PE32 20->61 dropped 63 C:\Users\user\AppData\...\Pzjrxzsuzrspbwy.vbs, ASCII 20->63 dropped 65 C:\Users\...\FywS42C4Uo.exe:Zone.Identifier, ASCII 20->65 dropped 109 Writes to foreign memory regions 20->109 111 Allocates memory in foreign processes 20->111 113 Injects a PE file into a foreign processes 20->113 26 wscript.exe 1 20->26         started        28 FywS42C4Uo.exe 20->28         started        signatures9 process10 dnsIp11 32 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 2 26->32         started        85 185.225.19.55, 49767, 80 MIVOCLOUDMD Romania 28->85 87 194.180.174.53, 49766, 80 MIVOCLOUDMD unknown 28->87 117 Contains functionality to steal Internet Explorer form passwords 28->117 35 WerFault.exe 23 9 28->35         started        signatures12 process13 dnsIp14 79 192.168.2.1 unknown unknown 32->79 38 cmd.exe 1 32->38         started        57 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 35->57 dropped file15 process16 process17 40 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 3 38->40         started        44 conhost.exe 38->44         started        file18 67 C:\...\Urvlrvwneyhytpzkvqupmosconsoleapp8.exe, PE32 40->67 dropped 115 Injects a PE file into a foreign processes 40->115 46 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 40->46         started        51 wscript.exe 40->51         started        signatures19 process20 dnsIp21 89 prepepe.ac.ug 185.215.113.77, 49781, 49817, 49820 WHOLESALECONNECTIONSNL Portugal 46->89 91 pretorian.ac.ug 46->91 71 C:\Users\user\AppData\Local\Temp\cc.exe, PE32 46->71 dropped 73 C:\Users\user\AppData\Local\Temp\pm.exe, PE32+ 46->73 dropped 75 C:\Users\user\AppData\...\vcruntime140.dll, PE32 46->75 dropped 77 47 other files (none is malicious) 46->77 dropped 93 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 46->93 95 Tries to steal Instant Messenger accounts or passwords 46->95 97 Tries to steal Mail credentials (via file / registry access) 46->97 99 4 other signatures 46->99 53 Urvlrvwneyhytpzkvqupmosconsoleapp8.exe 51->53         started        file22 signatures23 process24 process25 55 cmd.exe 53->55         started       
Threat name:
ByteCode-MSIL.Trojan.Zilla
Status:
Malicious
First seen:
2021-12-10 14:38:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
26 of 28 (92.86%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:5781468cedb3a203003fdf1f12e72fe98d6f1c0f collection discovery infostealer persistence spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M17
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
prepepe.ac.ug
Unpacked files
SH256 hash:
88aa7cb753d90d5969752a2c69c9824213f096e49572ae7bf152ec86ad57e027
MD5 hash:
53cd4c39b641785e9709eb3f64065cb4
SHA1 hash:
e96648e7407ea03e31d713a9b6700522f254fa20
SH256 hash:
63b9602e04ab9ad1641b7feb22889250b5ffdbcc5940103a774203c0768defa8
MD5 hash:
23c799f77a0756c0ebb5a50f9b8dff7e
SHA1 hash:
d2eaba7e6b5479abe4344c20272fbe1b6df7aa79
SH256 hash:
abd2881e25ff5a426511905d794d4f946592f382f7e7d780e915f61838455225
MD5 hash:
169b5bca3b96ba2747838da603a57096
SHA1 hash:
5528d720524647f7d236ecd7d435f3e32e821945
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
e3d88a1c15e69ad4fd55c8ce6a42999d05d7304a1dec6ed319265e91ee79500a
MD5 hash:
bc9066d728f1fe13249613e1551af276
SHA1 hash:
2ac39af2035a80c79c302848bf97287c6be0e60c
SH256 hash:
fe1f06a6fbc8c973bb3970f2386617db6980be11b605d82fe2f1070f643d9c84
MD5 hash:
e9a88091dccdc37223c9c1810e5098b3
SHA1 hash:
ead5991bed22e31f46ebb3933a1d25e872b1e265
SH256 hash:
ceec33b86a287dbd407d9f68f6adc12b9d7d975ab3d87565317f709d9d7ee816
MD5 hash:
56925cf6a9423cbed492fe6ff30a5dd3
SHA1 hash:
ca1fdce665bf06882a0e81d5a09608d9d99eccda
Detections:
win_raccoon_auto
SH256 hash:
a07131369c5c083c3e7e86b24af30f2129256756a47aec1f9908241538b5e829
MD5 hash:
d91b0cf35931ec3ff2cabb846cf69ab0
SHA1 hash:
9ed25447df6d60fe8783f6e9e5347c07d9377ef6
SH256 hash:
ac502569dbd5490208d7137f1cd1631449d2fd0a1fed96a87034172120d14bfa
MD5 hash:
80ebcb52404915f8b640d63dab81b0ec
SHA1 hash:
3910ea6ae084f7f3c8fb96aca65dfa94144e52e2
SH256 hash:
3b13453cb0fcdc127081392a2cbe48c3aa1a4235647d558124339193c76081b2
MD5 hash:
66516e4f666e60a4857ae51ca52d897d
SHA1 hash:
7c96edf552a4feea403bfb6a2cf3dfa4b29f1601
SH256 hash:
e3045c0db808eb86d2633ccc4957555fcdb943c98ad7d5e4f76df0ebcef8db03
MD5 hash:
45aaea034ff66ec26b0df02e53f55f0f
SHA1 hash:
2e3d5861d80104e7feb02b8384941dee037d07bb
SH256 hash:
d288b2765f558941145a2427529ee0df3707d5b846ef3ea2241dfd1b445c1e72
MD5 hash:
b02318a69848e91b2eae4189530cc308
SHA1 hash:
2195c668ff7cc2a8ca3bc9e53997cba55d92d953
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
0c26c4bc2912317d4e104beae3e4315f7042531fa1f044ebd3da11dea4f6d974
MD5 hash:
420d8eb15cf219dac5df1ea74aef9705
SHA1 hash:
a25f017611c802a7c1ea0f2a3b1ec6a3cc64e8af
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 0c26c4bc2912317d4e104beae3e4315f7042531fa1f044ebd3da11dea4f6d974

(this sample)

Comments



Avatar
zbet commented on 2021-12-10 14:37:32 UTC

url : hxxp://courtneyjones.ac.ug/zxcvb.exe