MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38f4fb2c7c3fe5f0e99d716a9c50e5be8242ee54fd8f81f4c8f0016d42f8591d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 38f4fb2c7c3fe5f0e99d716a9c50e5be8242ee54fd8f81f4c8f0016d42f8591d
SHA3-384 hash: ccb05596fa856f8c1d47c0ab7a7074cb110dd8c7a655be4401ac2621787be57e2fd700786fd1f4dc0cbacd6f13d2555f
SHA1 hash: cea810b05523007a657c9e1fe257345ea57ddd89
MD5 hash: dc422ed2d57fdbe9acb4df881def131e
humanhash: fourteen-wisconsin-louisiana-oxygen
File name:dc422ed2_by_Libranalysis
Download: download sample
Signature RaccoonStealer
File size:14'792'553 bytes
First seen:2021-05-25 11:02:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ced282d9b261d1462772017fe2f6972b (127 x Formbook, 113 x GuLoader, 70 x RemcosRAT)
ssdeep 393216:r4kTbrKBe0lf+YcnOlThRbf6sOT4K/pl2CC:XMh+dOxysOT4Kxl2T
Threatray 30 similar samples on MalwareBazaar
TLSH 94E63332F7905A66CEAB10FCAEC863AC3E3EB700F272505FDE53E9455E1A9C56124523
Reporter Libranalysis
Tags:RaccoonStealer


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dc422ed2_by_Libranalysis
Verdict:
No threats detected
Analysis date:
2021-05-25 11:52:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
Creating a file
Searching for analyzing tools
Searching for the window
Creating a window
Enabling the 'hidden' option for files in the %temp% directory
DNS request
Sending a custom TCP request
Deleting a recently created file
Reading critical registry keys
Delayed reading of the file
Running batch commands
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
66 / 100
Signature
Contains functionality to infect the boot sector
Hides threads from debuggers
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 423870 Sample: dc422ed2_by_Libranalysis Startdate: 25/05/2021 Architecture: WINDOWS Score: 66 78 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->78 80 Multi AV Scanner detection for domain / URL 2->80 82 Multi AV Scanner detection for submitted file 2->82 84 8 other signatures 2->84 9 dc422ed2_by_Libranalysis.exe 10 2->9         started        process3 file4 46 C:\Users\user\AppData\Local\...\coladzr.exe, PE32 9->46 dropped 48 C:\Users\user\...\Smart.Defrag.6.7.5.30.exe, PE32 9->48 dropped 12 coladzr.exe 91 9->12         started        17 Smart.Defrag.6.7.5.30.exe 2 9->17         started        process5 dnsIp6 62 telete.in 195.201.225.248, 443, 49740 HETZNER-ASDE Germany 12->62 64 iplogger.org 88.99.66.31, 443, 49741 HETZNER-ASDE Germany 12->64 66 genericalphabet.top 35.197.240.92, 443, 49742 GOOGLEUS United States 12->66 50 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 12->50 dropped 52 C:\Users\user\AppData\...\vcruntime140.dll, PE32 12->52 dropped 54 C:\Users\user\AppData\...\ucrtbase.dll, PE32 12->54 dropped 58 56 other files (none is malicious) 12->58 dropped 86 Query firmware table information (likely to detect VMs) 12->86 88 May check the online IP address of the machine 12->88 90 Tries to detect sandboxes and other dynamic analysis tools (window names) 12->90 92 4 other signatures 12->92 19 cmd.exe 1 12->19         started        68 6.7.5.30 DNIC-AS-00668US United States 17->68 56 C:\Users\user\...\Smart.Defrag.6.7.5.30.tmp, PE32 17->56 dropped 21 Smart.Defrag.6.7.5.30.tmp 27 159 17->21         started        file7 signatures8 process9 file10 24 conhost.exe 19->24         started        26 timeout.exe 1 19->26         started        38 C:\Users\user\AppData\...\iswin7logo.dll, PE32 21->38 dropped 40 C:\Users\user\AppData\Local\...\botva2.dll, PE32 21->40 dropped 42 C:\Users\user\AppData\Local\Temp\...\b2p.dll, PE32 21->42 dropped 44 59 other files (none is malicious) 21->44 dropped 28 SmartDefrag.exe 1 35 21->28         started        process11 dnsIp12 70 cs833182181.wpc.etacdn.net 152.199.20.140, 49774, 49775, 49777 EDGECASTUS United States 28->70 72 iobit-license.us-east-1.elasticbeanstalk.com 54.243.252.118, 49773, 80 AMAZON-AESUS United States 28->72 74 4 other IPs or domains 28->74 60 C:\Windows\...\IObitSmartDefragExtension.dll, PE32+ 28->60 dropped 94 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 28->94 33 CareScan.exe 28->33         started        36 regsvr32.exe 28->36         started        file13 signatures14 process15 signatures16 76 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 33->76
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-05-22 21:29:45 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon discovery evasion spyware stealer themida trojan
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Raccoon
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments