MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 118d0ce35d4f5528b2883f244355ff9cee93dcc8ca25bdd9a121f503df979e61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs 2 YARA File information Comments

SHA256 hash: 118d0ce35d4f5528b2883f244355ff9cee93dcc8ca25bdd9a121f503df979e61
SHA3-384 hash: 3968b64205910910937cbcbf272a9a01ff935bece6bfa9bec38d9a7a1c2e21dcea7657d168ff961c08b28cd4133172ab
SHA1 hash: fa62eaacda5309a82f31c5ddcac8484ca361e787
MD5 hash: 98b15cf42082a0f58b2e0183478b64a2
humanhash: burger-glucose-twelve-september
File name:98b15cf42082a0f58b2e0183478b64a2.exe
Download: download sample
Signature RaccoonStealer
File size:352'768 bytes
First seen:2021-10-22 18:44:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 85b11e7df91b461ff7ceddce26982802 (7 x RedLineStealer, 3 x RaccoonStealer)
ssdeep 6144:Rpxb5EWvU3cOMNTzNSg/dGpjhV16iRiaDHPYCvNIYW4QfhOy0maqDNG:R7aWDLNTzNSg0FbJR9DHPYkK4QJOyLak
Threatray 5'191 similar samples on MalwareBazaar
TLSH T10B746D10B6A0C039F5F316F44ABA9368A52E7EE16B2450CF53D52AEE47346E1EC3171B
File icon (PE):PE icon
dhash icon ead8ac9cc6a68ee0 (93 x RedLineStealer, 50 x RaccoonStealer, 15 x Smoke Loader)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
5.149.254.7:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
5.149.254.7:80 https://threatfox.abuse.ch/ioc/236639/
190.2.136.29:15554 https://threatfox.abuse.ch/ioc/236643/

Intelligence


File Origin
# of uploads :
1
# of downloads :
298
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
IcedID Raccoon SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
DLL reload attack detected
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Yara detected IcedID
Yara detected Raccoon Stealer
Yara detected SmokeLoader
Yara detected Vidar
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 507842 Sample: XGaf4aTBf9.exe Startdate: 22/10/2021 Architecture: WINDOWS Score: 100 73 mas.to 2->73 75 cdn.discordapp.com 2->75 77 absoluteall.xyz 2->77 99 Antivirus detection for URL or domain 2->99 101 Multi AV Scanner detection for dropped file 2->101 103 Multi AV Scanner detection for submitted file 2->103 105 10 other signatures 2->105 11 XGaf4aTBf9.exe 2->11         started        14 ugrjcdc 2->14         started        17 jvrjcdc 2->17         started        signatures3 process4 file5 135 Contains functionality to inject code into remote processes 11->135 137 Injects a PE file into a foreign processes 11->137 19 XGaf4aTBf9.exe 11->19         started        67 C:\Users\user\AppData\Local\Temp\1105.tmp, PE32 14->67 dropped 139 DLL reload attack detected 14->139 141 Detected unpacking (changes PE section rights) 14->141 143 Machine Learning detection for dropped file 14->143 145 3 other signatures 14->145 22 jvrjcdc 17->22         started        signatures6 process7 signatures8 107 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 19->107 109 Maps a DLL or memory area into another process 19->109 111 Checks if the current machine is a virtual machine (disk enumeration) 19->111 24 explorer.exe 15 19->24 injected 113 Creates a thread in another existing process (thread injection) 22->113 process9 dnsIp10 81 5.61.36.180, 49775, 80 LEASEWEB-DE-FRA-10DE United Kingdom 24->81 83 nusurtal4f.net 5.61.34.153, 49849, 80 LEASEWEB-DE-FRA-10DE United Kingdom 24->83 85 8 other IPs or domains 24->85 55 C:\Users\user\AppData\Roaming\ugrjcdc, PE32 24->55 dropped 57 C:\Users\user\AppData\Roaming\jvrjcdc, PE32 24->57 dropped 59 C:\Users\user\AppData\Local\Temp\F4AE.exe, PE32 24->59 dropped 61 10 other malicious files 24->61 dropped 121 System process connects to network (likely due to code injection or exploit) 24->121 123 Benign windows process drops PE files 24->123 125 Deletes itself after installation 24->125 127 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->127 29 839B.exe 2 24->29         started        34 6A34.exe 1 24->34         started        36 F4AE.exe 2 24->36         started        38 5 other processes 24->38 file11 signatures12 process13 dnsIp14 89 absoluteall.xyz 136.243.36.30, 443, 49800, 49806 HETZNER-ASDE Germany 29->89 69 C:\Users\user\AppData\Local\Temp\new.exe, PE32 29->69 dropped 147 Antivirus detection for dropped file 29->147 149 Performs DNS queries to domains with low reputation 29->149 151 Machine Learning detection for dropped file 29->151 40 new.exe 29->40         started        153 DLL reload attack detected 34->153 155 Detected unpacking (changes PE section rights) 34->155 169 5 other signatures 34->169 91 93.115.20.139, 28978, 49843 MVPShttpswwwmvpsnetEU Romania 36->91 157 Query firmware table information (likely to detect VMs) 36->157 159 Tries to detect sandboxes and other dynamic analysis tools (window names) 36->159 161 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 36->161 171 2 other signatures 36->171 93 enticationmetho.ink 128.199.29.128, 49844, 80 UCCS-UNIVERSITY-OF-COLORADO-COLORADO-SPRINGSUS United Kingdom 38->93 95 91.219.236.49, 49840, 80 SERVERASTRA-ASHU Hungary 38->95 97 5 other IPs or domains 38->97 71 C:\Users\user\AppData\Roaming\LLCA\new.exe, PE32 38->71 dropped 163 Detected unpacking (creates a PE file in dynamic memory) 38->163 165 Contains functionality to detect hardware virtualization (CPUID execution measurement) 38->165 167 Tries to detect virtualization through RDTSC time measurements 38->167 45 new.exe 38->45         started        47 DCE0.exe 38->47         started        49 WerFault.exe 38->49         started        file15 signatures16 process17 dnsIp18 87 absoluteall.xyz 40->87 63 C:\Users\user\AppData\...\AbsoluteLLC.exe, PE32 40->63 dropped 65 C:\Users\user\AppData\Roaming\...\module.exe, PE32 40->65 dropped 129 Antivirus detection for dropped file 40->129 131 Performs DNS queries to domains with low reputation 40->131 133 Machine Learning detection for dropped file 40->133 51 module.exe 40->51         started        file19 signatures20 process21 dnsIp22 79 absoluteall.xyz 51->79 115 Antivirus detection for dropped file 51->115 117 Performs DNS queries to domains with low reputation 51->117 119 Machine Learning detection for dropped file 51->119 signatures23
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-10-22 14:27:18 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://gejajoo7.top/
http://sysaheu9.top/
Unpacked files
SH256 hash:
097906bdec7fecaf49605e0c5fb1386352f41def3e81499cb73c72628662426e
MD5 hash:
e227480c64c0fcf5ec29f2747c84d2b8
SHA1 hash:
28a8e6758353d14f9d3fd69a0057ee43b27661c2
SH256 hash:
118d0ce35d4f5528b2883f244355ff9cee93dcc8ca25bdd9a121f503df979e61
MD5 hash:
98b15cf42082a0f58b2e0183478b64a2
SHA1 hash:
fa62eaacda5309a82f31c5ddcac8484ca361e787
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 118d0ce35d4f5528b2883f244355ff9cee93dcc8ca25bdd9a121f503df979e61

(this sample)

  
Delivery method
Distributed via web download

Comments