MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 331a035b68c79153633b20c90532d477d07195bfb7010eadcae4ce8b43d49365. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 10 File information Comments

SHA256 hash: 331a035b68c79153633b20c90532d477d07195bfb7010eadcae4ce8b43d49365
SHA3-384 hash: 9a4abd8984c7b2945b8f2c918bc2c50179d9123082279516c2c891e9c8d8c386f0b00426ab3e483c3a1f7b9590698e43
SHA1 hash: 34e4b7ed7cc28cb4daeeed4a62772bd5b2181d65
MD5 hash: 97064266bab53bed09295ba79403e95d
humanhash: burger-charlie-north-artist
File name:97064266bab53bed09295ba79403e95d.exe
Download: download sample
Signature RaccoonStealer
File size:512'000 bytes
First seen:2021-11-15 07:35:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a3c8ccf37a47553520e44f561732e116 (2 x RaccoonStealer)
ssdeep 12288:HxuFlbeOFJBWdNlFwJLzBJUHeb3uEiblDAaP79:Hx4beOFGdNh+b3uEi5DAaZ
Threatray 4'213 similar samples on MalwareBazaar
TLSH T132B4F0C0A6B2C437E4953D395962D6A0762BB971E834C506BB745B2E3DF33D08A6831F
File icon (PE):PE icon
dhash icon fcfcb4d4d4d4d8c0 (70 x RedLineStealer, 59 x RaccoonStealer, 24 x Smoke Loader)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://91.219.237.226/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.237.226/ https://threatfox.abuse.ch/ioc/248088/

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sending an HTTP GET request
Sending a UDP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware lockbit packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-11-15 07:36:08 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:8676acc62506c032cd3c072a17a90a5ec07283b3 stealer
Behaviour
Raccoon
Unpacked files
SH256 hash:
c1757c5e151f090127d19e2b6b053d3554db5ad3c01c2e2439ede23e31238001
MD5 hash:
e2c4f2a8af0ef1371acee3de777429f1
SHA1 hash:
e825c214e8d3fa3d4030be5ef676c34cda52db3d
Detections:
win_raccoon_auto
Parent samples :
9024f6ef5d63c82506ef2a9c0dc109d6d65f1d76ea5f8e2f748e719ab5eb2fab
37925a2e7e517718f5f2966786a60e7fbd8bc4045f0394a365abde68483f25a6
7bd96869acc1bbf4b3fb3f08b853fd22e259d780f0b469e149f94ea0386743e9
9229ec3799a341bd19431bdeff3486ca918529c155692fff783b22e4fb34a0a7
2dbaa3f2ead6dc481674eae6820704e3b6f3be60b9958340cf0a07b893d6e68f
5c57f5d5d9d42c5a30f32903119b88500449c275a9d933ba146542a489e990cf
3e33a762d28ac7fe0d78e56069f724e9bea14bc545e156ebfc2eed63aa70ad0f
331a035b68c79153633b20c90532d477d07195bfb7010eadcae4ce8b43d49365
78b2b161f808c002683f02842b501435d4cb7882fb983705ddef7630ad4fdfcf
96be4130444268f9bd01fcaf495100d8da5d5e047757566f4565cc71887f24a0
7a786be9025c31eafe6a35faf88294d0eea3c520eea9ae3bdfa142cedd4fd03b
f91adf1ec43d915a9e504abb57ebe80f62a958893662f618f020c83703c9f421
b18a90d447d2ac2f612c1640c4fa3ac7fa01b2d814dac1db2eab9d5e7359e0ec
c4cb16a7ebec65336ba7e92fd5cc22b046a615bfe8b027d0dde8d5b968d5e43c
fd8d6f55fecac98a6c41eca313230fd57caedb86e6320a37da2d45d0a72e228a
dd800100a3b6ad99333b4c120df5f868dbeeb84001f53f5ebcdae1a332663668
416065f85f2117a41923fd720e646b41ed726db57c6db52e678beda58fa8356d
563d4b5d010f6485171dd75371ec9a75d3e6d1a8c6f4534beec0e8c2bd217f57
ceceba4295082cb4bf61db00d0e20572290c3ed994a05f47339cae1810426ee4
fcb227609eefbbc44c64bc55fb68a7817717cc0db004b7c330163b7df2a705f4
651183ab8f2ce793daa7aa6fa8686fefe67d5851a237704be9bed4be8fdf0ad3
1b10ff1ed600b605aef19c876ad91e088e7172272a0fe8f45dac632611dfaaf8
c3b3802d5fff4b3e07ffeec853eed7d661b678533ffd764ba6d5966087e8d13f
1fa366be6a523ea194af9fc75bbeb3970092e849c29760647e533dad058f6a02
beb9ccd8250aa4de6381b5faa87b8f677cdab2cb6c6963d01dc1e7b26b4e3bd8
3626c033d57150f0dc41e398a118660bce49c9ac5f4f78fe912519ac0931b9db
d20c477a7a08185248ddde0ae53f0eb9e29dfde6614344767d7c5b97b9d46725
fbebf4c5d3e252cd107524b000e7507b54468511e5369d09669b111c2098edb5
SH256 hash:
331a035b68c79153633b20c90532d477d07195bfb7010eadcae4ce8b43d49365
MD5 hash:
97064266bab53bed09295ba79403e95d
SHA1 hash:
34e4b7ed7cc28cb4daeeed4a62772bd5b2181d65
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_EXEPWSH_DLAgent
Author:ditekSHen
Description:Detects SystemBC
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:Start2_net_bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:Start2_overlap_bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:Start2__bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:SystemBC_Config
Author:@bartblaze
Description:Identifies SystemBC RAT, decrypted config.
Rule name:SystemBC_Socks
Author:@bartblaze
Description:Identifies SystemBC RAT, Socks proxy version.
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.
Rule name:win_systembc_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.systembc.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 331a035b68c79153633b20c90532d477d07195bfb7010eadcae4ce8b43d49365

(this sample)

  
Delivery method
Distributed via web download

Comments