MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36dbd261a7559865cd8fcf4b437758e113c89cfd05dda604a646f343dda2abe6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 36dbd261a7559865cd8fcf4b437758e113c89cfd05dda604a646f343dda2abe6
SHA3-384 hash: 65ae93c67d05be996e7c801630cb48988fd85f83568cd3b45e68ca5f441c5aa31d6a4ff26860c0d13f0dbd4935839ebe
SHA1 hash: 522bb1afaf4df03bb477fa81fef9fcfe7a06bd85
MD5 hash: 59d49b51afa435d2695e7d84bee135e1
humanhash: fruit-football-saturn-illinois
File name:59D49B51AFA435D2695E7D84BEE135E1.exe
Download: download sample
Signature RaccoonStealer
File size:17'147'074 bytes
First seen:2021-08-30 22:47:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eb5bc6ff6263b364dfbfb78bdb48ed59 (54 x Adware.Generic, 18 x RaccoonStealer, 8 x Adware.ExtenBro)
ssdeep 393216:lolMJCXup7T1lLLpCUFXyLZ2bLG7h2clq1A2AUQ6:l8X819iZYNug
Threatray 2'985 similar samples on MalwareBazaar
TLSH T1BA07332BB295A53DD4AA2B350573A11088FBBB2DE4177E5627E0C48CCF365C01E3BE65
dhash icon c0d4ec80b0b4b4e4 (5 x RaccoonStealer, 4 x RedLineStealer, 4 x LummaStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://5.181.156.120/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.120/ https://threatfox.abuse.ch/ioc/203162/

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
59D49B51AFA435D2695E7D84BEE135E1.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-30 22:49:48 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file
Moving a recently created file
Deleting a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Replacing files
Blocking the Windows Defender launch
Unauthorized injection to a recently created process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
40 / 100
Signature
Antivirus / Scanner detection for submitted sample
Changes security center settings (notifications, updates, antivirus, firewall)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 474483 Sample: mKWphZ6Wlh.exe Startdate: 31/08/2021 Architecture: WINDOWS Score: 40 83 www.iobit.com 2->83 85 www.google.de 2->85 87 23 other IPs or domains 2->87 91 Antivirus / Scanner detection for submitted sample 2->91 93 Multi AV Scanner detection for submitted file 2->93 95 Sigma detected: WScript or CScript Dropper 2->95 10 mKWphZ6Wlh.exe 2 2->10         started        13 svchost.exe 2->13         started        16 svchost.exe 9 2 2->16         started        19 5 other processes 2->19 signatures3 process4 dnsIp5 75 C:\Users\user\AppData\...\mKWphZ6Wlh.tmp, PE32 10->75 dropped 21 mKWphZ6Wlh.tmp 8 21 10->21         started        101 Changes security center settings (notifications, updates, antivirus, firewall) 13->101 79 127.0.0.1 unknown unknown 16->79 81 192.168.2.1 unknown unknown 16->81 file6 signatures7 process8 file9 59 IObit.StartMenu.8.....1.Final.exe (copy), PE32 21->59 dropped 61 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 21->61 dropped 63 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 21->63 dropped 65 5 other files (none is malicious) 21->65 dropped 24 wscript.exe 1 21->24         started        26 IObit.StartMenu.8.vPro.5.3.0.1.Final.exe 2 21->26         started        process10 dnsIp11 30 cmd.exe 1 24->30         started        33 cmd.exe 24->33         started        35 cmd.exe 24->35         started        89 5.3.0.1 LINKEM-ASIT Russian Federation 26->89 77 IObit.StartMenu.8.vPro.5.3.0.1.Final.tmp, PE32 26->77 dropped 37 IObit.StartMenu.8.vPro.5.3.0.1.Final.tmp 18 327 26->37         started        file12 process13 file14 103 Uses cmd line tools excessively to alter registry or file data 30->103 105 Uses schtasks.exe or at.exe to add and modify task schedules 30->105 40 reg.exe 30->40         started        43 reg.exe 30->43         started        45 conhost.exe 30->45         started        57 15 other processes 30->57 47 conhost.exe 33->47         started        49 mode.com 33->49         started        51 7z.exe 33->51         started        53 conhost.exe 35->53         started        55 timeout.exe 35->55         started        67 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 37->67 dropped 69 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 37->69 dropped 71 C:\Users\user\AppData\Local\...\RdZone.dll, PE32 37->71 dropped 73 94 other files (none is malicious) 37->73 dropped signatures15 process16 signatures17 97 Disables Windows Defender (deletes autostart) 40->97 99 Disable Windows Defender real time protection (registry) 43->99
Threat name:
Win32.Trojan.Pasnaino
Status:
Malicious
First seen:
2021-08-29 01:04:10 UTC
AV detection:
8 of 26 (30.77%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:3659cc597a258a4a805c5672721af02cdb861a23 agilenet discovery evasion spyware stealer trojan
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Defender Real-time Protection settings
Modifies security service
Raccoon
Unpacked files
SH256 hash:
697cf9b7a364edac75cd0451aed93b09a477fb7a345758416084d6f65b501c0a
MD5 hash:
259d2f304354aa7635e11272f1f736f3
SHA1 hash:
4deb8eb3b858f04a328e48a4e4b0a22453ef8068
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
2cb9ac0bb9995c1351a97b48867722f42d720dfd11e4459577bfd8c68d0a9c85
MD5 hash:
76a43227847b006e7dd8a9c4390011ae
SHA1 hash:
b0115e4ea328578d473bedeaf8d494c917484f69
SH256 hash:
4cd34502895c8369b613ad45631d22a9414d1c9e8d61a1adc345c4290a4d8ffc
MD5 hash:
71da7fec095a4aade8fc1146622eef1c
SHA1 hash:
a0f22fec2a84454697b748c000c4288a939c1dd4
SH256 hash:
28ad1018827596e36f34b8c63a1f4fe6c6e7012954fcf2c45ba6320dd3fbb02c
MD5 hash:
a0e39afa1b3cd684829c56cb7b267da8
SHA1 hash:
8e5805e1a415588bbf60be24806caf91501dcb40
SH256 hash:
641f8ac075f4635617793a448cf69fd04f3326473838475284d3420a5767bb1a
MD5 hash:
758a2163a127489deb358f21b0b68510
SHA1 hash:
9ce554793fc6024b5246fe32fb213092ec6a61fb
SH256 hash:
86a547b7911d8ef03b3011bce67d3a4664821042525cdbfadefe9be31dc271c5
MD5 hash:
05564ac0a61a7d86e01500f973316072
SHA1 hash:
2380be5c8f707b036ea59e43d4581708ac9bab37
SH256 hash:
c572a666cedd96db409aa041c022cc40703aba7ad3b47de32d26bffd78ee8870
MD5 hash:
0ac1d9b42629cf25f9f2fbb9df6cc9c6
SHA1 hash:
05a4d2b421c89b819bc086a3ed67820e3756cb13
SH256 hash:
a7fc85189ec672c4de3cde5dd41d5a218b9556012ad88a4cdfc21a8d41d2cd15
MD5 hash:
81ffe106e6df8d9cafbe46aa10f79eb4
SHA1 hash:
3707ea02bebd9055512cfff94358432aa367c786
SH256 hash:
a359a1cb32b367aab19104b131377a25274b00495bbd2dd63dbd5ecd84580005
MD5 hash:
56925af192d4e062d8e2b8d87bffbcdb
SHA1 hash:
c1f149ba35fd7f629a8cfc9fad516de2d10676ca
SH256 hash:
7ce3b67386af6a7be7600fb3ed161780ee106702e846cde9cec05d36fecb1e44
MD5 hash:
583cb1e997fd02e3cc5f1d8a32a3d445
SHA1 hash:
51c6cc8eb24e75184cc11bd92a8050c30e662cd9
SH256 hash:
724f8f0413808aaa102df264fa9690d2b300aa570ac74a19f10d84d8c4eccd0d
MD5 hash:
d996f811feb30dbb09dcc45b44f42443
SHA1 hash:
a3d05f55bc0dac6cfa0e20a6cf25b0c8e3848f12
SH256 hash:
bea56b3f57672e3408688907017d9d2a8fb146afa7582c5f5e9b68ab0a1dae26
MD5 hash:
512f6bf696fdd6e90b5b1a8c0fa8930c
SHA1 hash:
72c1169223f520066d411231eba3e45f855cdaf4
SH256 hash:
fb1c061b31e7dd1b8bfd5a0f1a1a0eceb848ecde7e435d2ae89e678e91aa6f26
MD5 hash:
662473f1cf10c040d8afec56e1ddf21d
SHA1 hash:
10aa9b19320ce95d3af33433f89abcb8cad7f240
SH256 hash:
721a310cdf3b295359801fc2d46b71d354762ef407e431219fa63967572fe8c3
MD5 hash:
d6cbf30ef4db829b08ab1ec6758e9fad
SHA1 hash:
06107167278d3a0b03395499e0b0baf24ee8f16e
SH256 hash:
999ed85b0bcbfb9fc5e4be83291674d4e66041b7cab6e9a13adfee831b6ce45e
MD5 hash:
7c3769de96f61f310867d32a0fc39e56
SHA1 hash:
0139f565553fd27532a397d537bc34cba1e06eee
SH256 hash:
36dbd261a7559865cd8fcf4b437758e113c89cfd05dda604a646f343dda2abe6
MD5 hash:
59d49b51afa435d2695e7d84bee135e1
SHA1 hash:
522bb1afaf4df03bb477fa81fef9fcfe7a06bd85
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments