MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 25613a9993c484dc8dd00937e0487299cc454e786eabd10cbf1a390a6ffdf0dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 12
| SHA256 hash: | 25613a9993c484dc8dd00937e0487299cc454e786eabd10cbf1a390a6ffdf0dc |
|---|---|
| SHA3-384 hash: | 8d0cbeff67b3882882ec851d3c0f65f3267d7ba026e8a6ef28355e98aa6bacfcb31e4447cffc8b11a64eb1a8a799ee57 |
| SHA1 hash: | d8f3688a59dc4cbf7f1d8813165319b21b8c88c7 |
| MD5 hash: | 340822180b4caf3a92d1b91c5c6e6a74 |
| humanhash: | uranus-cardinal-oregon-cola |
| File name: | 340822180b4caf3a92d1b91c5c6e6a74.exe |
| Download: | download sample |
| File size: | 1'192'960 bytes |
| First seen: | 2022-10-26 10:11:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e958f9c91f53edd19c93afb299d2d23c (10 x ArkeiStealer) |
| ssdeep | 24576:naIMiZ9puDlXLpKY5bcrKlz5kAQqh3/wDTbuLE:naIMEpuDlXLpKY55mAh3/wDTbQE |
| Threatray | 108 similar samples on MalwareBazaar |
| TLSH | T15445BF4A28C326B2EC290A3CC9415D773E39BA31EAB55ADB43CA06F5553F153D84EF42 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
218
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
340822180b4caf3a92d1b91c5c6e6a74.exe
Verdict:
Malicious activity
Analysis date:
2022-10-26 10:18:24 UTC
Tags:
trojan raccoon recordbreaker loader stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Launching a process
Creating a file in the %AppData% subdirectories
Sending a custom TCP request
Сreating synchronization primitives
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2022-10-26 04:30:21 UTC
File Type:
PE (Exe)
AV detection:
25 of 41 (60.98%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 98 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Loads dropped DLL
Downloads MZ/PE file
Gathering data
Unpacked files
SH256 hash:
25613a9993c484dc8dd00937e0487299cc454e786eabd10cbf1a390a6ffdf0dc
MD5 hash:
340822180b4caf3a92d1b91c5c6e6a74
SHA1 hash:
d8f3688a59dc4cbf7f1d8813165319b21b8c88c7
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 25613a9993c484dc8dd00937e0487299cc454e786eabd10cbf1a390a6ffdf0dc
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.