MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 35405fdecc554572244c745e390644ae713070f0bf81b29b9b54f6a738cb0ea5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 35405fdecc554572244c745e390644ae713070f0bf81b29b9b54f6a738cb0ea5
SHA3-384 hash: 1647c3d5fd04b1175ce06fa1b204787675d36306149ef0dec8a05d160c74a35b5041efd9a4705173782b2d90f1f8ca2a
SHA1 hash: 20aaacc6b69d84c8709a9a1ad97b61d9ba774ffc
MD5 hash: 93ce0b245ba803cd48dadb27ceaa7435
humanhash: harry-nebraska-summer-single
File name:93ce0b245ba803cd48dadb27ceaa7435.exe
Download: download sample
Signature RaccoonStealer
File size:431'620 bytes
First seen:2021-11-04 17:20:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fbe4cce31825940f582af9763f8c6fb6 (4 x RaccoonStealer, 2 x RedLineStealer, 2 x Smoke Loader)
ssdeep 12288:RmYOeohQrubHQwIkRW403duc2NUzG9agvkPypkD:R6eoxHQwIkRWr3V8kP3D
TLSH T1C194011076E1D437E1A60A705D7486B61DB67852FA7C648BFBE91B3E2E603F08A35313
File icon (PE):PE icon
dhash icon 480c3c4c4f594b14 (22 x Smoke Loader, 16 x RedLineStealer, 10 x Tofsee)
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
93ce0b245ba803cd48dadb27ceaa7435.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-04 18:33:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-11-04 17:21:08 UTC
AV detection:
21 of 45 (46.67%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:b3ed1d79826001317754d88a62db05820a1ecd19 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Raccoon
Unpacked files
SH256 hash:
25a4b6c6b34adf706411f6f6b91c46de7a80728964492e6eb11f2281e9678717
MD5 hash:
2f9b640b36cbd54b3c835289cc8075cd
SHA1 hash:
9e849ddf0cbb3291065a12408bc798c7cd7686d9
Detections:
win_raccoon_auto
SH256 hash:
35405fdecc554572244c745e390644ae713070f0bf81b29b9b54f6a738cb0ea5
MD5 hash:
93ce0b245ba803cd48dadb27ceaa7435
SHA1 hash:
20aaacc6b69d84c8709a9a1ad97b61d9ba774ffc
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 35405fdecc554572244c745e390644ae713070f0bf81b29b9b54f6a738cb0ea5

(this sample)

  
Delivery method
Distributed via web download

Comments