MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46e99e70a21a9ecd28e61195f175bea9260eea38b1718f6750166688d955e91e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 8


Intelligence 8 IOCs 5 YARA 3 File information Comments

SHA256 hash: 46e99e70a21a9ecd28e61195f175bea9260eea38b1718f6750166688d955e91e
SHA3-384 hash: 0d322c36f6e3b3ea63390cecd90d2cc4eea26519e7db83d1ab77e69e1886582ba5c213f39b16e66c0bbd1f724003b05a
SHA1 hash: 1b23c3637e4ddb26115bd9152525d15b4af73a36
MD5 hash: 15cc8191e7728032cdabe71fac938139
humanhash: oxygen-tango-spring-stairway
File name:15CC8191E7728032CDABE71FAC938139.exe
Download: download sample
Signature RaccoonStealer
File size:4'113'410 bytes
First seen:2021-05-27 21:30:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xKCvLUBsgbg6l+Pmmfj9w9jEDMUxkZ1S+KnzFkZRmWxTHnl2A:xLLUCgbNlrgmxgMIkZ10smWBFP
Threatray 14 similar samples on MalwareBazaar
TLSH 8016339277C105B6D5A0D0B4B99C9B7386BD43E807305CE3A764C94DAA3EC92B32774E
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://morckp04.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://morckp04.top/index.php https://threatfox.abuse.ch/ioc/65659/
http://geowqr42.top/index.php https://threatfox.abuse.ch/ioc/65660/
http://45.153.230.32/ https://threatfox.abuse.ch/ioc/66258/
185.244.181.187:57969 https://threatfox.abuse.ch/ioc/66352/
87.251.71.21:50359 https://threatfox.abuse.ch/ioc/66353/

Intelligence


File Origin
# of uploads :
1
# of downloads :
162
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
15CC8191E7728032CDABE71FAC938139.exe
Verdict:
No threats detected
Analysis date:
2021-05-27 21:46:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates files with lurking names (e.g. Crack.exe)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 425951 Sample: 5YEJ3DP17T.exe Startdate: 27/05/2021 Architecture: WINDOWS Score: 100 112 email.yg9.me 2->112 138 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->138 140 Found malware configuration 2->140 142 Antivirus detection for URL or domain 2->142 144 7 other signatures 2->144 11 5YEJ3DP17T.exe 16 2->11         started        signatures3 process4 file5 82 C:\Users\user\AppData\...\setup_install.exe, PE32 11->82 dropped 84 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 11->84 dropped 86 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 11->86 dropped 88 11 other files (6 malicious) 11->88 dropped 14 setup_install.exe 1 11->14         started        process6 dnsIp7 130 estrix.xyz 172.67.165.117, 49719, 80 CLOUDFLARENETUS United States 14->130 132 127.0.0.1 unknown unknown 14->132 176 Detected unpacking (changes PE section rights) 14->176 178 Performs DNS queries to domains with low reputation 14->178 18 cmd.exe 1 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 8 other processes 14->24 signatures8 process9 process10 26 metina_4.exe 1 1 18->26         started        31 metina_1.exe 5 20->31         started        33 metina_7.exe 22->33         started        35 metina_2.exe 1 24->35         started        37 metina_3.exe 16 24->37         started        39 metina_5.exe 24->39         started        41 2 other processes 24->41 dnsIp11 116 ip-api.com 208.95.112.1, 49723, 80 TUT-ASUS United States 26->116 124 2 other IPs or domains 26->124 90 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 26->90 dropped 156 Antivirus detection for dropped file 26->156 158 Multi AV Scanner detection for dropped file 26->158 160 May check the online IP address of the machine 26->160 43 jfiag3g_gg.exe 26->43         started        46 jfiag3g_gg.exe 26->46         started        92 C:\Users\user\AppData\Local\...\install.dll, PE32 31->92 dropped 48 rundll32.exe 31->48         started        118 privacytools.xyz 45.139.187.152, 49729, 80 HostingvpsvilleruRU Russian Federation 33->118 120 moonlabmediacompany.com 89.221.213.3, 80 WEDOSCZ Czech Republic 33->120 126 14 other IPs or domains 33->126 94 C:\Users\...\t2qpyrnpCdBCmk6BrqbY6nBa.exe, PE32 33->94 dropped 104 12 other files (none is malicious) 33->104 dropped 162 Performs DNS queries to domains with low reputation 33->162 164 Machine Learning detection for dropped file 33->164 96 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 35->96 dropped 166 Renames NTDLL to bypass HIPS 35->166 168 Checks if the current machine is a virtual machine (disk enumeration) 35->168 50 explorer.exe 35->50 injected 128 2 other IPs or domains 37->128 170 Detected unpacking (changes PE section rights) 37->170 172 Detected unpacking (overwrites its own PE header) 37->172 98 C:\Users\user\AppData\Local\...\metina_5.tmp, PE32 39->98 dropped 52 metina_5.tmp 39->52         started        122 172.67.145.48 CLOUDFLARENETUS United States 41->122 100 C:\Users\user\AppData\Roaming\2318371.exe, PE32 41->100 dropped 102 C:\Users\user\AppData\Local\...\Crack.exe, PE32 41->102 dropped 106 3 other files (none is malicious) 41->106 dropped 174 Creates files with lurking names (e.g. Crack.exe) 41->174 56 Crack.exe 41->56         started        58 PbOSetp.exe 41->58         started        file12 signatures13 process14 dnsIp15 146 Antivirus detection for dropped file 43->146 148 Tries to harvest and steal browser information (history, passwords, etc) 43->148 150 Writes to foreign memory regions 48->150 152 Allocates memory in foreign processes 48->152 154 Creates a thread in another existing process (thread injection) 48->154 60 svchost.exe 48->60 injected 62 svchost.exe 48->62 injected 114 198.54.126.101 NAMECHEAP-NETUS United States 52->114 70 C:\Users\user\...\_____Zi____DanE______10.exe, PE32 52->70 dropped 72 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 52->72 dropped 74 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 52->74 dropped 76 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 52->76 dropped 64 _____Zi____DanE______10.exe 52->64         started        78 C:\Users\user\...\logi_audio_conexant.dll, PE32+ 56->78 dropped 80 C:\Users\...\legacy_forcefeedback_x86.dll, PE32 56->80 dropped 68 conhost.exe 56->68         started        file16 signatures17 process18 dnsIp19 108 13.107.4.50 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 64->108 110 162.0.210.44 ACPCA Canada 64->110 134 Antivirus detection for dropped file 64->134 136 Machine Learning detection for dropped file 64->136 signatures20
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-05-25 03:53:45 UTC
AV detection:
28 of 47 (59.57%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader aspackv2 backdoor infostealer trojan upx
Behaviour
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
PlugX
RedLine
RedLine Payload
SmokeLoader
Malware Config
C2 Extraction:
http://20xbtc.com/upload/
http://yzsnw.com/upload/
http://kaledebiyat.com/upload/
http://expertizizmir.com/upload/
http://dedkndy.com/upload/
http://theuncu.com/upload/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments