MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f7aa46027a15a329be8297a786d8c9c61f8ae89dcca9a72d88e0cfc08f38ec2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 2 File information Comments

SHA256 hash: 2f7aa46027a15a329be8297a786d8c9c61f8ae89dcca9a72d88e0cfc08f38ec2
SHA3-384 hash: 63a397e55e99b36e8f3f42c060ca1f16b10d1b4af7eaf60e7f65cb6846b7d2a10227612449f74c732626894e688c3874
SHA1 hash: 19e47795deca11f7183ca753cf07bfcbc0da9ddd
MD5 hash: 4f9cba2ba09fb0b3d5bb2048f4c724c8
humanhash: magazine-charlie-equal-bakerloo
File name:2f7aa46027a15a329be8297a786d8c9c61f8ae89dcca9.exe
Download: download sample
Signature RaccoonStealer
File size:512'512 bytes
First seen:2021-09-17 13:55:52 UTC
Last seen:2021-09-17 15:03:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4b2f006e9c8103411c7e9e0d41005636 (4 x RaccoonStealer, 2 x Smoke Loader, 1 x RedLineStealer)
ssdeep 6144:NB2n7d85n53c91btS9DALuxBE+HN3uXjcf9H5IEU3WmkEgZW4vtwCewElRCRjzEx:inuFN+bY9ULuW09tU4WkwCe5KaeCP
Threatray 3'072 similar samples on MalwareBazaar
TLSH T15DB4021235A0C472C3A15EB46423E395D63AFDE2596C628F77647B2E7F313A0673A306
dhash icon 327a7c7d727e6e76 (7 x RaccoonStealer, 4 x RedLineStealer, 1 x DanaBot)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://179.43.175.24/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://179.43.175.24/ https://threatfox.abuse.ch/ioc/222954/

Intelligence


File Origin
# of uploads :
2
# of downloads :
154
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2f7aa46027a15a329be8297a786d8c9c61f8ae89dcca9.exe
Verdict:
Malicious activity
Analysis date:
2021-09-17 13:57:27 UTC
Tags:
installer trojan stealer raccoon loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Clipboard Hijacker Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Self deletion via cmd delete
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Clipboard Hijacker
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 485199 Sample: 2f7aa46027a15a329be8297a786... Startdate: 17/09/2021 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for domain / URL 2->57 59 Found malware configuration 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 4 other signatures 2->63 8 2f7aa46027a15a329be8297a786d8c9c61f8ae89dcca9.exe 82 2->8         started        13 sqlcmd.exe 2->13         started        process3 dnsIp4 43 telete.in 195.201.225.248, 443, 49738 HETZNER-ASDE Germany 8->43 45 179.43.175.24, 49739, 80 PLI-ASCH Panama 8->45 47 45.141.84.30, 49740, 80 MEDIALAND-ASRU Russian Federation 8->47 33 C:\Users\user\AppData\...\yxBLhhM93g.exe, PE32 8->33 dropped 35 C:\Users\user\AppData\...\vcruntime140.dll, PE32 8->35 dropped 37 C:\Users\user\AppData\...\ucrtbase.dll, PE32 8->37 dropped 39 57 other files (none is malicious) 8->39 dropped 65 Detected unpacking (changes PE section rights) 8->65 67 Detected unpacking (overwrites its own PE header) 8->67 69 Tries to steal Mail credentials (via file access) 8->69 73 2 other signatures 8->73 15 yxBLhhM93g.exe 1 8->15         started        19 cmd.exe 1 8->19         started        71 Contains functionality to compare user and computer (likely to detect sandboxes) 13->71 21 schtasks.exe 1 13->21         started        file5 signatures6 process7 file8 41 C:\Users\user\AppData\Roaming\...\sqlcmd.exe, PE32 15->41 dropped 49 Detected unpacking (changes PE section rights) 15->49 51 Detected unpacking (overwrites its own PE header) 15->51 53 Uses schtasks.exe or at.exe to add and modify task schedules 15->53 55 Contains functionality to compare user and computer (likely to detect sandboxes) 15->55 23 schtasks.exe 1 15->23         started        25 conhost.exe 19->25         started        27 timeout.exe 1 19->27         started        29 conhost.exe 21->29         started        signatures9 process10 process11 31 conhost.exe 23->31         started       
Threat name:
Win32.Trojan.DllCheck
Status:
Malicious
First seen:
2021-09-17 13:56:09 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon discovery spyware stealer
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies system certificate store
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Raccoon
Unpacked files
SH256 hash:
765d19b4728008c1589f222d1fa49f1cb7310204c7a4574eb9f930d0544bed7b
MD5 hash:
043da3110ddd8f5ac84e7f9c0d2d685e
SHA1 hash:
2d13ecbc31ccf9921cbf6f0b2089fae09d4f4395
Detections:
win_raccoon_auto
Parent samples :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 hash:
2f7aa46027a15a329be8297a786d8c9c61f8ae89dcca9a72d88e0cfc08f38ec2
MD5 hash:
4f9cba2ba09fb0b3d5bb2048f4c724c8
SHA1 hash:
19e47795deca11f7183ca753cf07bfcbc0da9ddd
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments