MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40f4f7b3233351e4885a1758cd4eb0981dc5361aa7a354a981ed3ed6363f53ae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments 1

SHA256 hash: 40f4f7b3233351e4885a1758cd4eb0981dc5361aa7a354a981ed3ed6363f53ae
SHA3-384 hash: d5b84535dad0c3006d4fe9832005415c413125af488d13152f8d1f6fcd6218815498398073aa95644841ade5f23ec8b2
SHA1 hash: 271776d22bb408f5ac2c1c375f116f0cfe5315cf
MD5 hash: a92ecf7fef1451c1ebd6f7886a9e22d5
humanhash: golf-early-august-kentucky
File name:a92ecf7fef1451c1ebd6f7886a9e22d5
Download: download sample
Signature RaccoonStealer
File size:1'265'152 bytes
First seen:2021-09-22 01:15:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4f0265512a1363fc11fe0c410b950baf (5 x RaccoonStealer)
ssdeep 24576:GnrOChfE476dtiw8t+cZHlcBIfej4gRgq16CeRrLs1/cLG4pNdWgWu33Mqz2:GrOC9EEOixtjSBWeMgt6CeRk1/cLG4p3
Threatray 5'491 similar samples on MalwareBazaar
TLSH T14645223AC64A8462E84A117ABC5BCC752AB4BC35C6F24C79F5D4F97FA2B5342006D21F
File icon (PE):PE icon
dhash icon b2e0b496a6cadaf2 (1 x RaccoonStealer, 1 x ArkeiStealer, 1 x RedLineStealer)
Reporter zbetcheckin
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
209
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Found malware configuration
Hides threads from debuggers
Infostealer behavior detected
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-09-20 16:59:48 UTC
AV detection:
19 of 45 (42.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Checks BIOS information in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
355da7eb1665a551d9b5372442506115ce77f4d70265203cba15d7ce14ed93d5
MD5 hash:
4ba7a47ddf471b5cce6b6d78f6f8c8f0
SHA1 hash:
b30cc1e64a7553460b532923d4abc69135a6aca9
SH256 hash:
40f4f7b3233351e4885a1758cd4eb0981dc5361aa7a354a981ed3ed6363f53ae
MD5 hash:
a92ecf7fef1451c1ebd6f7886a9e22d5
SHA1 hash:
271776d22bb408f5ac2c1c375f116f0cfe5315cf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 40f4f7b3233351e4885a1758cd4eb0981dc5361aa7a354a981ed3ed6363f53ae

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-22 01:15:38 UTC

url : hxxp://45.133.1.182/WW/file6.exe