MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0dcc54b7413d2c838980c6ccdb5d68c52a0a1b7994d212c537291460a5c49aa0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 14
| SHA256 hash: | 0dcc54b7413d2c838980c6ccdb5d68c52a0a1b7994d212c537291460a5c49aa0 |
|---|---|
| SHA3-384 hash: | 7de71c9067406dbea101d8d8084fc2974e4f43da3ffef9612745be6226d43808fd01d12237e82d23071ee79b1777bd1e |
| SHA1 hash: | 46187f216b6e8d6d894441c6716a09e77b62c9e8 |
| MD5 hash: | 09bd76a5a38154170634e8ce27ae3a62 |
| humanhash: | washington-cola-stairway-delaware |
| File name: | 09bd76a5a38154170634e8ce27ae3a62.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 524'288 bytes |
| First seen: | 2022-03-22 19:11:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9b5dd8ae6c49e5fbd407dc1f346434cc (4 x RaccoonStealer, 2 x RedLineStealer, 2 x Stop) |
| ssdeep | 12288:h2nhiIAPcmwZIuCf+khaAjxUhA0Mnynsq:huhiIgcmn+khjjxUhZEOX |
| Threatray | 6'066 similar samples on MalwareBazaar |
| TLSH | T194B41280BA02C035C48565712469C2712A3E9E357261CE1FFB9A773D2F313EA66F5B93 |
| File icon (PE): | |
| dhash icon | 5c599a3ce0c1c850 (36 x RedLineStealer, 27 x Stop, 21 x Smoke Loader) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://185.163.204.62/ | https://threatfox.abuse.ch/ioc/437100/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_Raccoon |
|---|---|
| Author: | ditekSHen |
| Description: | Raccoon stealer payload |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.