MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3dc57dcb56f96be6067cb54322ec97aea1724c1ec8084ae7f8b1a71d140352a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments 1

SHA256 hash: 3dc57dcb56f96be6067cb54322ec97aea1724c1ec8084ae7f8b1a71d140352a0
SHA3-384 hash: 3f53c7d66bd70631f062be35b463843db67dbf23efbe32d3007445651af55f6291b40025f48a628d262c6d5527378a27
SHA1 hash: 80507bd3142ca4e2136b71fd8e45ce872611e467
MD5 hash: d90dce4c9b940d6099e1efc55ff514bd
humanhash: juliet-lithium-vermont-black
File name:d90dce4c9b940d6099e1efc55ff514bd
Download: download sample
Signature RaccoonStealer
File size:1'272'320 bytes
First seen:2021-12-10 14:57:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:1ioqKsUvUBs1bucO2SJ/NYF2nnohmP1+W2g2Fl4NPuvT:1ioDMW1bu2iO+p2g2Fl4NGvT
Threatray 5'658 similar samples on MalwareBazaar
TLSH T1AA45F10EA311C602FC58D7346EBB6FA012B4BAB2AD92C397FB5D1A3C446B3795C41356
File icon (PE):PE icon
dhash icon 34d4424ce8568aa2 (2 x RaccoonStealer)
Reporter zbetcheckin
Tags:32 exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
325
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d90dce4c9b940d6099e1efc55ff514bd
Verdict:
Suspicious activity
Analysis date:
2021-12-10 15:00:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Sending an HTTP GET request
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint obfuscated packed stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult DBatLoader Raccoon
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to steal Internet Explorer form passwords
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected DBatLoader
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 537908 Sample: f5VSeoyqAF Startdate: 10/12/2021 Architecture: WINDOWS Score: 100 86 www.uplooder.net 2->86 108 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->108 110 Malicious sample detected (through community Yara rule) 2->110 112 Antivirus detection for URL or domain 2->112 114 12 other signatures 2->114 15 f5VSeoyqAF.exe 2 2->15         started        signatures3 process4 file5 76 C:\Users\user\AppData\...\f5VSeoyqAF.exe.log, ASCII 15->76 dropped 18 cmd.exe 1 15->18         started        process6 process7 20 f5VSeoyqAF.exe 3 5 18->20         started        24 conhost.exe 18->24         started        file8 66 C:\Users\user\AppData\...\f5VSeoyqAF.exe, PE32 20->66 dropped 68 Mnfutumjppetruxrga...lsaconsoleapp17.exe, PE32 20->68 dropped 70 C:\Users\...\f5VSeoyqAF.exe:Zone.Identifier, ASCII 20->70 dropped 72 C:\Users\user\AppData\...\Pzjrxzsuzrspbwy.vbs, ASCII 20->72 dropped 116 Writes to foreign memory regions 20->116 118 Allocates memory in foreign processes 20->118 120 Injects a PE file into a foreign processes 20->120 26 wscript.exe 1 20->26         started        28 f5VSeoyqAF.exe 20->28         started        signatures9 process10 dnsIp11 32 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 2 26->32         started        92 185.225.19.55, 49764, 80 MIVOCLOUDMD Romania 28->92 94 194.180.174.53, 49762, 80 MIVOCLOUDMD unknown 28->94 124 Contains functionality to steal Internet Explorer form passwords 28->124 34 WerFault.exe 23 9 28->34         started        signatures12 process13 dnsIp14 38 cmd.exe 1 32->38         started        88 192.168.2.1 unknown unknown 34->88 64 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 34->64 dropped file15 process16 process17 40 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 3 38->40         started        44 conhost.exe 38->44         started        file18 74 C:\...\Urvlrvwneyhytpzkvqupmosconsoleapp8.exe, PE32 40->74 dropped 122 Injects a PE file into a foreign processes 40->122 46 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 40->46         started        51 wscript.exe 40->51         started        53 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 40->53         started        55 Mnfutumjppetruxrgamifzlsaconsoleapp17.exe 40->55         started        signatures19 process20 dnsIp21 96 prepepe.ac.ug 185.215.113.77, 49781, 49815, 49821 WHOLESALECONNECTIONSNL Portugal 46->96 98 pretorian.ac.ug 46->98 78 C:\Users\user\AppData\Local\Temp\cc.exe, PE32 46->78 dropped 80 C:\Users\user\AppData\Local\Temp\pm.exe, PE32+ 46->80 dropped 82 C:\Users\user\AppData\...\vcruntime140.dll, PE32 46->82 dropped 84 47 other files (none is malicious) 46->84 dropped 100 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 46->100 102 Tries to steal Instant Messenger accounts or passwords 46->102 104 Tries to steal Mail credentials (via file / registry access) 46->104 106 4 other signatures 46->106 57 cc.exe 46->57         started        60 Urvlrvwneyhytpzkvqupmosconsoleapp8.exe 51->60         started        file22 signatures23 process24 dnsIp25 90 www.uplooder.net 144.76.120.25, 443, 49822, 49823 HETZNER-ASDE Germany 57->90 62 cmd.exe 60->62         started        process26
Threat name:
ByteCode-MSIL.Spyware.Msilzilla
Status:
Malicious
First seen:
2021-12-10 14:58:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
25 of 28 (89.29%)
Threat level:
  2/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:5781468cedb3a203003fdf1f12e72fe98d6f1c0f discovery infostealer spyware stealer trojan
Behaviour
Checks processor information in registry
Kills process with taskkill
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
prepepe.ac.ug
http://195.245.112.115/index.php
Unpacked files
SH256 hash:
8f91e0b2d38652675b64ede35cd28eda7aabf20a7c5ed7fd0e2033326fc3e70a
MD5 hash:
15d3b2336110bcce69c7046e47dd384c
SHA1 hash:
fa56948678f9fece0a57a8866bbcb8b291365c28
SH256 hash:
c97e2526c7211228fc1ed20edc2cba1a6d5ec451ce3c3554513dce0b8294adc0
MD5 hash:
b0a40ec92ae3479c88e62329a9fa5caf
SHA1 hash:
f386560e21fe439273667364d6c9276be52210f4
SH256 hash:
63b9602e04ab9ad1641b7feb22889250b5ffdbcc5940103a774203c0768defa8
MD5 hash:
23c799f77a0756c0ebb5a50f9b8dff7e
SHA1 hash:
d2eaba7e6b5479abe4344c20272fbe1b6df7aa79
SH256 hash:
abd2881e25ff5a426511905d794d4f946592f382f7e7d780e915f61838455225
MD5 hash:
169b5bca3b96ba2747838da603a57096
SHA1 hash:
5528d720524647f7d236ecd7d435f3e32e821945
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
8288711bfefd946eb4b9c5610642136c69d4e95ff2ad5ac705fa41f3a1a84740
MD5 hash:
5ba206a6e201b3720dd103b4fb620254
SHA1 hash:
d0463873db41dc49f10cff913059fe6dc4e797d8
SH256 hash:
e3045c0db808eb86d2633ccc4957555fcdb943c98ad7d5e4f76df0ebcef8db03
MD5 hash:
45aaea034ff66ec26b0df02e53f55f0f
SHA1 hash:
2e3d5861d80104e7feb02b8384941dee037d07bb
SH256 hash:
d288b2765f558941145a2427529ee0df3707d5b846ef3ea2241dfd1b445c1e72
MD5 hash:
b02318a69848e91b2eae4189530cc308
SHA1 hash:
2195c668ff7cc2a8ca3bc9e53997cba55d92d953
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
ceec33b86a287dbd407d9f68f6adc12b9d7d975ab3d87565317f709d9d7ee816
MD5 hash:
56925cf6a9423cbed492fe6ff30a5dd3
SHA1 hash:
ca1fdce665bf06882a0e81d5a09608d9d99eccda
Detections:
win_raccoon_auto
SH256 hash:
7a80589a92cd2b8f13762761592dfa911baa5417b259eb15c25159131cbc2852
MD5 hash:
90ff4d3264264da5cce7c14b47864d18
SHA1 hash:
c65418156f554825c04a5a855e7244e9f7df6acd
SH256 hash:
ac502569dbd5490208d7137f1cd1631449d2fd0a1fed96a87034172120d14bfa
MD5 hash:
80ebcb52404915f8b640d63dab81b0ec
SHA1 hash:
3910ea6ae084f7f3c8fb96aca65dfa94144e52e2
SH256 hash:
e5e43a3f86c0189680cff95fcc4471a2f41e5d661045a662782e435613b8adaf
MD5 hash:
067da387005294f2496cd49a4aa87874
SHA1 hash:
068a25b869d3ee7fcbbb5648fd2963e8ccd98abd
SH256 hash:
3dc57dcb56f96be6067cb54322ec97aea1724c1ec8084ae7f8b1a71d140352a0
MD5 hash:
d90dce4c9b940d6099e1efc55ff514bd
SHA1 hash:
80507bd3142ca4e2136b71fd8e45ce872611e467
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 3dc57dcb56f96be6067cb54322ec97aea1724c1ec8084ae7f8b1a71d140352a0

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-10 14:57:11 UTC

url : hxxp://kodekode.ac.ug/ghjkl.exe