MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: 0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1
SHA3-384 hash: 32a33e08d271bf78ff5e26bd3064d5535ff6f9ca6cb09a36b965f328e12385fd3782736cc5532dddae1d2029f045cd89
SHA1 hash: 8ccc6b05df9cd2ab9275e2848a997176b3cd41c8
MD5 hash: 8e84fa4f3e50e2bdc357c348b923a8b4
humanhash: william-louisiana-grey-uranus
File name:8e84fa4f3e50e2bdc357c348b923a8b4.exe
Download: download sample
Signature RaccoonStealer
File size:215'552 bytes
First seen:2020-11-29 07:27:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1d88d597200c0081784c27940d743ec5 (6 x AZORult, 3 x RaccoonStealer, 1 x MBRLocker)
ssdeep 3072:NWEv+PTBTYm7BsOzKSU2pr1RJoutgYdNC1W:NWEvMlTb7GyrLJoShdNn
Threatray 1'842 similar samples on MalwareBazaar
TLSH B724D31A2948608FFC32F37599BF9B67230ABE7B2405944737F878752172E836C512DA
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://morasergiox.ac.ug/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Sending a UDP request
Launching a process
Creating a window
Creating a process from a recently created file
Deleting a recently created file
DNS request
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a file
Unauthorized injection to a recently created process
Launching a file downloaded from the Internet
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MSHTA Spawning Windows Shell
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Suspicious powershell command line found
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 324338 Sample: gVVj6h9pcF.exe Startdate: 29/11/2020 Architecture: WINDOWS Score: 100 51 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->51 53 Multi AV Scanner detection for domain / URL 2->53 55 Antivirus detection for URL or domain 2->55 57 6 other signatures 2->57 9 gVVj6h9pcF.exe 11 2->9         started        process3 file4 47 C:\Users\user\AppData\Local\...\patch.exe, PE32 9->47 dropped 49 C:\Users\user\AppData\Local\Temp\...\m1a.hta, HTML 9->49 dropped 12 cmd.exe 3 2 9->12         started        process5 process6 14 mshta.exe 1 12->14         started        17 mshta.exe 1 12->17         started        19 mshta.exe 1 12->19         started        21 5 other processes 12->21 signatures7 59 Suspicious powershell command line found 14->59 23 powershell.exe 15 14->23         started        25 powershell.exe 17->25         started        27 powershell.exe 19->27         started        61 Multi AV Scanner detection for dropped file 21->61 29 powershell.exe 21->29         started        31 powershell.exe 21->31         started        33 powershell.exe 21->33         started        process8 process9 35 conhost.exe 23->35         started        37 conhost.exe 25->37         started        39 conhost.exe 27->39         started        41 conhost.exe 29->41         started        43 conhost.exe 31->43         started        45 conhost.exe 33->45         started       
Threat name:
Win32.Trojan.Activator
Status:
Malicious
First seen:
2019-08-28 01:39:53 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:asyncrat family:azorult family:oski family:raccoon discovery evasion infostealer rat spyware stealer trojan upx
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Drops desktop.ini file(s)
JavaScript code in executable
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Blacklisted process makes network request
Executes dropped EXE
Async RAT payload
AsyncRat
Azorult
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Oski
Raccoon
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
agentttt.ac.ug:6970
agentpurple.ac.ug:6970
Dropper Extraction:
http://kfdhsa.ru/asdfg.exe
http://nicoslag.ru/asdfg.exe
http://bit.do/e5K5i
http://bit.do/e5K4M
http://bit.do/e5K4b
http://bratiop.ru/asdfg.exe
Unpacked files
SH256 hash:
e737c058e7550314c1d9091f6772e401c58c0fae877256cdb984397652ba4da1
MD5 hash:
9fbcde2bef57f19074b0e38dc594e7bc
SHA1 hash:
85e585d60b95586722d17456c1456093320f432d
SH256 hash:
150ee23e07c4ed058a1db1cb2e03c626e41f37d6564fd9620988cee44e04d307
MD5 hash:
a4f7780075f698d6b1e86a264eb221bc
SHA1 hash:
5ac1f937d69c14026de0ed0d7202338db55c3b79
SH256 hash:
0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1
MD5 hash:
8e84fa4f3e50e2bdc357c348b923a8b4
SHA1 hash:
8ccc6b05df9cd2ab9275e2848a997176b3cd41c8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments