MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ee261129b9e2370a045116534b6d9669c8b2d9315ba2f1a9124888a60bc5acf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 1ee261129b9e2370a045116534b6d9669c8b2d9315ba2f1a9124888a60bc5acf
SHA3-384 hash: d2c5edbb513115959eb0a8f1fadc2fccb6f644ead1a5c1fe02d8d8a4aa63675cadcdd3eeea520e4aa3f8f68d125abd8d
SHA1 hash: 737686816b88d96fa63edfd916da29d882f8ea55
MD5 hash: 80ea5601dfddd352cad47e20c2e77f86
humanhash: tango-paris-diet-zebra
File name:80ea5601dfddd352cad47e20c2e77f86
Download: download sample
Signature RaccoonStealer
File size:602'112 bytes
First seen:2022-01-18 00:33:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6d8809088101df222b4da2c9c6c93c39 (2 x RedLineStealer, 2 x RaccoonStealer, 1 x Loki)
ssdeep 12288:iHlOgMY0jVVDun8TVELDS9U9m6Y/PvyLjBE07qoarfXnsH2J/MfW+1mD:aPMYsVun8TVELO9U9m6YfyJE07AbXsHM
Threatray 5'948 similar samples on MalwareBazaar
TLSH T145D4CF00A790D039F6F722F449BAA3A8753EBAF1572451CB62D516EE97346E0ED3130B
File icon (PE):PE icon
dhash icon 2dec1378399b9b91 (25 x Smoke Loader, 22 x RedLineStealer, 7 x RaccoonStealer)
Reporter zbetcheckin
Tags:32 exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
80ea5601dfddd352cad47e20c2e77f86
Verdict:
Malicious activity
Analysis date:
2022-01-18 01:04:10 UTC
Tags:
trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Sending an HTTP GET request
DNS request
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CPUID_Instruction
MeasuringTime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cybergate greyware mikey packed racealer
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-01-17 19:47:20 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:628dbe616eb46c5e66398ea6a12fa931e1f38eaf stealer
Behaviour
Checks processor information in registry
Suspicious use of AdjustPrivilegeToken
Raccoon
Unpacked files
SH256 hash:
6def4f5419e4cc709f1b496834a6bb3c67d71dcb082d0dcf22859b4418b9eb89
MD5 hash:
bc11f5bff1d54e02ba53ee76d13bf886
SHA1 hash:
6225b8a2f5794f68591ffa6c59cbbe7e34451226
Detections:
win_raccoon_auto
SH256 hash:
1ee261129b9e2370a045116534b6d9669c8b2d9315ba2f1a9124888a60bc5acf
MD5 hash:
80ea5601dfddd352cad47e20c2e77f86
SHA1 hash:
737686816b88d96fa63edfd916da29d882f8ea55
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 1ee261129b9e2370a045116534b6d9669c8b2d9315ba2f1a9124888a60bc5acf

(this sample)

  
Delivery method
Distributed via web download

Comments