MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 178e86f12f303d0273810858fffffb6a1f74a4a00c79be02e2646602f8d0c8e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 1 File information 3 Yara 2 Comments

SHA256 hash: 178e86f12f303d0273810858fffffb6a1f74a4a00c79be02e2646602f8d0c8e7
SHA3-384 hash: 3fdfb22a642a98cd3f5b49b9b154570abcfc84c6309b2c03c3057c7cb98423b2c409fc91d76be0d3dcb62dd38de3d12a
SHA1 hash: e73a0484018f2e30ac4340191a2dd5871fdbe7d8
MD5 hash: 26f1d22c7bb09832139f51e2a8231069
humanhash: solar-diet-oranges-uncle
File name:26f1d22c7bb09832139f51e2a8231069.exe
Download: download sample
Signature RaccoonStealer
File size:479'744 bytes
First seen:2020-06-30 17:24:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9df0376eebbb1789af13c87424174a69
ssdeep 12288:/R5sDMuky9Hx7cK+P/Wa02Ua632En2Bpq:pmMNy37cKM/JUdr2pq
TLSH ACA402113361E032E44675707578E2B14A7AA8715A28A487B7D4DE3EBF327E1D33E329
Reporter @abuse_ch
Tags:exe RaccoonStealer

Intelligence


Mail intelligence No data
# of uploads 1
# of downloads 37
Origin country US US
CAPE Sandbox Detection:n/a
Link: https://www.capesandbox.com/analysis/17490/
ClamAV PUA.Win.Downloader.Aiis-6803892-0
CERT.PL MWDB Detection:raccoon
Link: https://mwdb.cert.pl/sample/178e86f12f303d0273810858fffffb6a1f74a4a00c79be02e2646602f8d0c8e7/
ReversingLabs :Status:Malicious
Threat name:Win32.Trojan.Kryptik
First seen:2020-06-30 17:26:05 UTC
AV detection:27 of 31 (87.10%)
Threat level:   5/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:raccoon
Link: https://tria.ge/reports/200630-ac5w9y524j/
Tags:ransomware evasion spyware trojan discovery stealer family:raccoon
VirusTotal:Virustotal results 31.51%

Yara Signatures


Rule name:win_raccoon_a0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 178e86f12f303d0273810858fffffb6a1f74a4a00c79be02e2646602f8d0c8e7

(this sample)

  
Delivery method
Distributed via web download

Comments