MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d6a2c000a65290f3a6cae16c26fe29589795065ad4aeb9d5548efd900969f9d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs 2 YARA File information Comments

SHA256 hash: 2d6a2c000a65290f3a6cae16c26fe29589795065ad4aeb9d5548efd900969f9d
SHA3-384 hash: c76165c4a6022c22de4592b1cf3580136dbf223eb2b7b6e91c618cc3a437bd997bb4b109b2a16e29103203109116aaad
SHA1 hash: 705f30fd5a69aaa515d184a415de2bcdb739e0f8
MD5 hash: f466b9e58cb30856bf9c7bf87d5d0394
humanhash: carpet-don-glucose-salami
File name:f466b9e58cb30856bf9c7bf87d5d0394.exe
Download: download sample
Signature RaccoonStealer
File size:243'712 bytes
First seen:2022-02-04 08:25:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f475ca0986fe34ed2b7116546d5970ae (2 x RedLineStealer, 1 x RaccoonStealer, 1 x Smoke Loader)
ssdeep 3072:N86JM8HRRTvELjET4xvXziVpW5yus9YbcrxicL11OHUSXWD:Nvq8HrTELJxvXzi5uXexicL1oUH
TLSH T19F34AE313A80C6F2F4C615309425CFA15BFBF8715AA4814B77E83BAE6F703E09666356
File icon (PE):PE icon
dhash icon 367e7c7f767e6e76 (4 x RedLineStealer, 1 x RaccoonStealer, 1 x Stop)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://91.219.236.18/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.236.18/ https://threatfox.abuse.ch/ioc/378337/
http://2.56.59.26/dima/index.php https://threatfox.abuse.ch/ioc/379269/

Intelligence


File Origin
# of uploads :
1
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Gathering data
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2022-02-04 08:26:08 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 2d6a2c000a65290f3a6cae16c26fe29589795065ad4aeb9d5548efd900969f9d

(this sample)

  
Delivery method
Distributed via web download

Comments