MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 39d315cd7c986f2f67360720d9a390b4720799ad36ac88b668c9ced2beede0c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | 39d315cd7c986f2f67360720d9a390b4720799ad36ac88b668c9ced2beede0c7 |
|---|---|
| SHA3-384 hash: | f76bab5917c57d106a84c0fb500b6a3f8b0e1d1cb7ff4e4ff5b2b7770ea367d2483d14d8f28a70fc6c70d8e987c841d0 |
| SHA1 hash: | 3a49e80abe55e507e95d3064d1f9dc46b4280db2 |
| MD5 hash: | aaa3f3fccf28798a9370808462a16f4d |
| humanhash: | music-cola-uncle-sixteen |
| File name: | aaa3f3fccf28798a9370808462a16f4d.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 499'712 bytes |
| First seen: | 2021-09-21 19:50:34 UTC |
| Last seen: | 2021-09-21 20:56:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b423274974f58a1d1a63a5242c6dcf99 (12 x RedLineStealer, 5 x RaccoonStealer, 3 x ArkeiStealer) |
| ssdeep | 12288:Z/g0MKJFbuW7DcA08vEsmQykEcKMkBay:60ZJFbuM08vVVy/cUp |
| Threatray | 3'176 similar samples on MalwareBazaar |
| TLSH | T141B401013E90CA31E49765305830D2B45AB6F891F4A4EC8B7BEAFAAF3E316815671717 |
| File icon (PE): | |
| dhash icon | b27a7c7d727e6e76 (9 x RaccoonStealer, 1 x RedLineStealer, 1 x AZORult) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://45.95.11.122/ | https://threatfox.abuse.ch/ioc/224422/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
270
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aaa3f3fccf28798a9370808462a16f4d.exe
Verdict:
Malicious activity
Analysis date:
2021-09-21 19:51:34 UTC
Tags:
trojan stealer raccoon loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Raccoon
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Self deletion via cmd delete
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Detection:
raccoon
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-09-21 19:51:05 UTC
AV detection:
21 of 45 (46.67%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
raccoon
Similar samples:
+ 3'166 additional samples on MalwareBazaar
Result
Malware family:
raccoon
Score:
10/10
Tags:
family:raccoon discovery spyware stealer
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Suspicious use of WriteProcessMemory
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Raccoon
Unpacked files
SH256 hash:
2b846276cddcb96a51df3052f4f63232f4a9615e08df959342185ed0255c3f0c
MD5 hash:
6f5936f1ebe731d1069daa1b20473a6f
SHA1 hash:
e83bd74f6ebb2b095cffb5f534c3ad1d0017c7c3
Detections:
win_raccoon_auto
Parent samples :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 hash:
39d315cd7c986f2f67360720d9a390b4720799ad36ac88b668c9ced2beede0c7
MD5 hash:
aaa3f3fccf28798a9370808462a16f4d
SHA1 hash:
3a49e80abe55e507e95d3064d1f9dc46b4280db2
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.