MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1553300557f17e7cb62c914616267bc733854b98a0edc5215d901cc4f8e4d0f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 5 File information Comments

SHA256 hash: 1553300557f17e7cb62c914616267bc733854b98a0edc5215d901cc4f8e4d0f0
SHA3-384 hash: c2a2a1e98d247a13608300cd159b3da696757dddcf01e89e81c0eb330cbe6f11f2a68f1f947c42907a2ba29d8f887f0d
SHA1 hash: 0f0e4bd8f204aaf8245fc3b420b97761bfd252e0
MD5 hash: aa2ccc64b34017295aa8560cd11a34bc
humanhash: sweet-september-social-cold
File name:aa2ccc64b34017295aa8560cd11a34bc.exe
Download: download sample
Signature RaccoonStealer
File size:1'306'624 bytes
First seen:2020-08-31 12:32:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0320232b42c0bfbc92efc4f95a2299b9 (3 x RaccoonStealer)
ssdeep 24576:lk8AUYlD3adqXfdsPuBhk8FBPOLhQCRk86jJh9LLQ5CLmQde:lk8AllDf5zk8FmhQCRk86zBLQ5QmQde
Threatray 204 similar samples on MalwareBazaar
TLSH C055122699B71067E82A66B653D086D44BBDFC633185BC3FDF0026849EE399911C3B37
Reporter abuse_ch
Tags:ArkeiStealer AsyncRAT AZORult exe nVpn RaccoonStealer RAT RemcosRAT


Avatar
abuse_ch
RaccoonStealer C2:
http://34.65.231.1/gate/log.php

AZORult C2:
http://projectx.ug/index.php

ArkeiStealer C2:
http://projectx.ug/index.php

RemcosRAT C2:
protagonist.ac.ug:6969 (185.140.53.205)

Hosted on nVpn:

% Information related to '185.140.53.0 - 185.140.53.255'

% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'

inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-EU3
country: EU
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-07-28T20:56:03Z
source: RIPE

AsyncRAT C2:
194.5.98.95:6970

Hosted on nVpn:

% Information related to '194.5.98.0 - 194.5.98.255'

% Abuse contact for '194.5.98.0 - 194.5.98.255' is 'abuse@privacyfirst.sh'

inetnum: 194.5.98.0 - 194.5.98.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-EU6
country: EU
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2019-04-26T16:42:54Z
last-modified: 2020-07-30T03:41:26Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a file
Deleting a recently created file
Reading critical registry keys
Running batch commands
Creating a process with a hidden window
Replacing files
Launching a process
Delayed writing of the file
Using the Windows Management Instrumentation requests
Searching for the window
Connection attempt
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Launching a tool to kill processes
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Threat name:
Azorult Raccoon Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Executable Used by PlugX in Uncommon Location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Keylogger Generic
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 280092 Sample: qySMTADEjr.exe Startdate: 31/08/2020 Architecture: WINDOWS Score: 100 98 fgdjhksdfsdxcbv.ru 2->98 100 asdxcvxdfgdnbvrwe.ru 2->100 102 4 other IPs or domains 2->102 118 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->118 120 Multi AV Scanner detection for domain / URL 2->120 122 Found malware configuration 2->122 124 14 other signatures 2->124 10 qySMTADEjr.exe 16 2->10         started        signatures3 process4 file5 88 C:\Users\user\AppData\...\dfgmhjHJdfgopi.exe, PE32 10->88 dropped 90 C:\Users\user\AppData\...\JHBVfdsadvbcx.exe, PE32 10->90 dropped 150 Detected unpacking (changes PE section rights) 10->150 152 Detected unpacking (overwrites its own PE header) 10->152 154 Contains functionality to steal Internet Explorer form passwords 10->154 156 Maps a DLL or memory area into another process 10->156 14 dfgmhjHJdfgopi.exe 4 10->14         started        17 qySMTADEjr.exe 85 10->17         started        21 JHBVfdsadvbcx.exe 4 10->21         started        signatures6 process7 dnsIp8 158 Detected unpacking (changes PE section rights) 14->158 160 Maps a DLL or memory area into another process 14->160 23 dfgmhjHJdfgopi.exe 64 14->23         started        92 telete.in 195.201.225.248, 443, 49724 HETZNER-ASDE Germany 17->92 94 34.65.231.1, 49738, 49739, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->94 96 projectz.ug 17->96 64 C:\Users\user\AppData\...\machineinfo.txt, ASCII 17->64 dropped 66 C:\Users\user\AppData\...\j1owsPLTSF.exe, PE32 17->66 dropped 68 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 17->68 dropped 70 60 other files (none is malicious) 17->70 dropped 162 Tries to steal Mail credentials (via file access) 17->162 164 Hides threads from debuggers 17->164 28 0dDkd4wKKA.exe 17->28         started        30 cmd.exe 17->30         started        32 j1owsPLTSF.exe 17->32         started        36 2 other processes 17->36 166 Detected unpacking (overwrites its own PE header) 21->166 34 JHBVfdsadvbcx.exe 181 21->34         started        file9 signatures10 process11 dnsIp12 72 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 23->72 dropped 74 C:\Users\user\AppData\Local\Temp\ds2.exe, PE32 23->74 dropped 76 C:\Users\user\AppData\Local\Temp\ds1.exe, PE32 23->76 dropped 84 48 other files (none is malicious) 23->84 dropped 132 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->132 134 Tries to steal Instant Messenger accounts or passwords 23->134 136 Tries to steal Mail credentials (via file access) 23->136 148 2 other signatures 23->148 38 rc.exe 23->38         started        42 cmd.exe 23->42         started        44 ds2.exe 23->44         started        54 2 other processes 23->54 108 googlehosted.l.googleusercontent.com 172.217.168.33, 443, 49746, 49752 GOOGLEUS United States 28->108 110 192.168.2.1 unknown unknown 28->110 112 doc-00-58-docs.googleusercontent.com 28->112 138 Writes to foreign memory regions 28->138 140 Allocates memory in foreign processes 28->140 142 Creates a thread in another existing process (thread injection) 28->142 46 notepad.exe 28->46         started        48 conhost.exe 30->48         started        50 timeout.exe 30->50         started        114 projectx.ug 217.8.117.77, 49725, 49726, 49740 CREXFEXPEX-RUSSIARU Russian Federation 34->114 116 projecty.ug 34->116 78 C:\ProgramData\vcruntime140.dll, PE32 34->78 dropped 80 C:\ProgramData\sqlite3.dll, PE32 34->80 dropped 82 C:\ProgramData\softokn3.dll, PE32 34->82 dropped 86 4 other files (none is malicious) 34->86 dropped 144 Tries to steal Crypto Currency Wallets 34->144 146 Hides threads from debuggers 34->146 52 cmd.exe 34->52         started        file13 signatures14 process15 dnsIp16 104 googlehosted.l.googleusercontent.com 38->104 106 doc-00-58-docs.googleusercontent.com 38->106 126 Writes to foreign memory regions 38->126 128 Allocates memory in foreign processes 38->128 130 Creates a thread in another existing process (thread injection) 38->130 56 conhost.exe 42->56         started        58 timeout.exe 42->58         started        60 conhost.exe 52->60         started        62 taskkill.exe 52->62         started        signatures17 process18
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-08-31 12:16:27 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
ransomware spyware discovery persistence evasion trojan rat family:remcos infostealer family:azorult family:oski family:asyncrat stealer family:raccoon
Behaviour
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
JavaScript code in executable
Legitimate hosting services abused for malware hosting/C2
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
AsyncRat
Azorult
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Oski
Raccoon
Raccoon log file
Remcos
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_oski_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_a0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 1553300557f17e7cb62c914616267bc733854b98a0edc5215d901cc4f8e4d0f0

(this sample)

Comments