MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 29712959e15dd06735537ee66cdef63de2e25518e60308294c3cd5e227e14c1a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 29712959e15dd06735537ee66cdef63de2e25518e60308294c3cd5e227e14c1a
SHA3-384 hash: 2eb259938d1f75399e31c2eb4ecdaefe7dc9e2e3c45d8468de64645fbc0929e23c5579a6f1b09870fdc54b6070d8cf27
SHA1 hash: a9120aaedc514f747c66fb0e02fa6f8b5d1f1e4d
MD5 hash: 5604e4dc70c604340d68222760eb6c7a
humanhash: cat-may-michigan-sweet
File name:5604e4dc70c604340d68222760eb6c7a.exe
Download: download sample
Signature RaccoonStealer
File size:242'176 bytes
First seen:2021-10-05 05:11:12 UTC
Last seen:2021-10-05 06:00:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 98e53b2cb31fce4d393c9de9e623875b (6 x RaccoonStealer, 1 x RedLineStealer)
ssdeep 6144:ioj6bWHeStDd9TjB1INSGP5EuSwsbL3MAgc+:i6L+0Dd9oNSGP5kwsvsc+
Threatray 7'931 similar samples on MalwareBazaar
TLSH T194348D10A7E0C034F2B712BA49B593B9A53EBEB05B3491CB67D116EA46786F0DD30397
File icon (PE):PE icon
dhash icon e0f8e8e8aa66a499 (12 x RedLineStealer, 11 x RaccoonStealer, 5 x ArkeiStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://194.180.174.80/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://194.180.174.80/ https://threatfox.abuse.ch/ioc/230436/

Intelligence


File Origin
# of uploads :
2
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5604e4dc70c604340d68222760eb6c7a.exe
Verdict:
Suspicious activity
Analysis date:
2021-10-05 05:14:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-10-05 04:55:07 UTC
AV detection:
18 of 45 (40.00%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:raccoon family:smokeloader botnet:5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4 backdoor discovery spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Raccoon
SmokeLoader
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
Malware Config
C2 Extraction:
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
Unpacked files
SH256 hash:
592b089027938156e18387e4402b965a5f1ffc25e96d7efc3aa9331254587bdd
MD5 hash:
2dbb1eb8c40c88994738a736ad55c79b
SHA1 hash:
88e2fc9242606c7dfcd68d5da8c6d457837157a3
SH256 hash:
29712959e15dd06735537ee66cdef63de2e25518e60308294c3cd5e227e14c1a
MD5 hash:
5604e4dc70c604340d68222760eb6c7a
SHA1 hash:
a9120aaedc514f747c66fb0e02fa6f8b5d1f1e4d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 29712959e15dd06735537ee66cdef63de2e25518e60308294c3cd5e227e14c1a

(this sample)

  
Delivery method
Distributed via web download

Comments