MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 10fb27aeb699fab2c1e2c4be638674d6fc421553ed87373d3d8483e8bdc29047. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | 10fb27aeb699fab2c1e2c4be638674d6fc421553ed87373d3d8483e8bdc29047 |
|---|---|
| SHA3-384 hash: | ea797712399770174f9cb62b417c0d22cdab26b583c5cef74c500bee82ff2a52f051497eda722a3bc1ef3ae3400c21f0 |
| SHA1 hash: | 67fd350d7bbec9870ad2ef825b2a47d0d83ca519 |
| MD5 hash: | 8a6705f4e9e95c27fc3cec4bbe894dd3 |
| humanhash: | angel-california-neptune-lion |
| File name: | SecuriteInfo.com.W32.AIDetect.malware1.26466.22952 |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 527'872 bytes |
| First seen: | 2021-03-16 17:45:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9b427574c93cbfa13fbdfd4a9927f632 (1 x RaccoonStealer) |
| ssdeep | 12288:PmB3LImjPIxFOjwngzsiNVQDbvQXbtyoHf2TiVYJ/FqdPH:PQLPqowggiNKDcxyoVi/8P |
| Threatray | 598 similar samples on MalwareBazaar |
| TLSH | D9B4E01072D0C173D05274B585E9C7F49E7AB4725B666ACBBBC40EBD5F24BC0AA3132A |
| Reporter | |
| Tags: | RaccoonStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Email_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Email in files like avemaria |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | @ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_Raccoon |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Raccoon/Racealer infostealer |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.