MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2b2b2b7bb20ce4a49a3e58b7177661c6dc19aa01d1550ea6a352ef92a3ee99b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments 1

SHA256 hash: 2b2b2b7bb20ce4a49a3e58b7177661c6dc19aa01d1550ea6a352ef92a3ee99b2
SHA3-384 hash: 6b4cb52d7332ae24a1de7787e01936bf2e9c1b8b4cd5717454607e4041d6c0b9ba90c66f08f90c3d827f20fbe88f9b59
SHA1 hash: 8bd058abdd9e9eccf66577e7df849099b864cd13
MD5 hash: 000e43fe0944da48d0e033d95a7cf1e0
humanhash: pennsylvania-mississippi-fanta-vegan
File name:setup - 2021-04-09T114140.132.exe
Download: download sample
Signature RaccoonStealer
File size:335'872 bytes
First seen:2021-04-12 06:36:14 UTC
Last seen:2021-04-12 09:55:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5c9f82cdabd8e2926163412888fe3f28 (2 x RaccoonStealer, 1 x CryptBot)
ssdeep 6144:FFRkpULl0VzIwFm8fEzHgLH4oAvGb585hAcBToHtX:FFRbhkIyjkgLYoAvCkAcBToHZ
Threatray 42 similar samples on MalwareBazaar
TLSH 9E64BE1133E0C133C51364758625C7B18E3BB471AB75A9CB7BC40FB85F296C2AA3A70A
Reporter JAMESWT_WT
Tags:RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C++ Dropper.exe
Verdict:
Malicious activity
Analysis date:
2021-04-12 00:20:14 UTC
Tags:
evasion loader trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending an HTTP GET request
Deleting a recently created file
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Sending a UDP request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Searching for the window
Creating a file
Delayed reading of the file
Reading critical registry keys
Creating a window
Connection attempt
Sending an HTTP POST request
Launching a process
Sending a TCP request to an infection source
Launching a tool to kill processes
Stealing user critical data
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
92 / 100
Signature
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Ranumbot
Status:
Malicious
First seen:
2021-04-10 16:59:49 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
30 of 48 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Deletes itself
Unpacked files
SH256 hash:
936786476500a1ddab0d8c0d9e36e0b35a07f305f85fab9b2318a345fb351513
MD5 hash:
34a0e5d9e174e078eaff3a5a2e7df021
SHA1 hash:
f548eed715c69a8fa5a16e5f334c8d6c960c0f1d
SH256 hash:
2b2b2b7bb20ce4a49a3e58b7177661c6dc19aa01d1550ea6a352ef92a3ee99b2
MD5 hash:
000e43fe0944da48d0e033d95a7cf1e0
SHA1 hash:
8bd058abdd9e9eccf66577e7df849099b864cd13
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 2b2b2b7bb20ce4a49a3e58b7177661c6dc19aa01d1550ea6a352ef92a3ee99b2

(this sample)

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-14 16:14:50 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [C0049] File System Micro-objective::Get File Attributes
2) [C0051] File System Micro-objective::Read File
3) [C0052] File System Micro-objective::Writes File
4) [C0033] Operating System Micro-objective::Console
5) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
6) [C0040] Process Micro-objective::Allocate Thread Local Storage
7) [C0041] Process Micro-objective::Set Thread Local Storage Value
8) [C0018] Process Micro-objective::Terminate Process