MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4701e82080bbf43bfaf8dee522b66e11ee9029154eca770701e34e3a7822f263. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 4701e82080bbf43bfaf8dee522b66e11ee9029154eca770701e34e3a7822f263
SHA3-384 hash: 55943e3b46958fd013e95a57cb6b5697b13d2f0af8fd6d42249cb1bea9e9d0b3f22b877af768c48bf1bdcbb3cd201d28
SHA1 hash: e9008ea9e6da7547fa1d8914d9d2d77cb3977e36
MD5 hash: 50f3588df57df36f71786cb7fd2876fd
humanhash: lion-spring-queen-high
File name:50f3588df57df36f71786cb7fd2876fd.exe
Download: download sample
Signature RaccoonStealer
File size:574'976 bytes
First seen:2021-10-13 17:07:23 UTC
Last seen:2021-10-13 18:18:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6914b510638d71b110829c8d3f3435fd (3 x RaccoonStealer, 1 x ArkeiStealer)
ssdeep 12288:BcW1HJ+I3MF7H2Jl7XOwIVN5j3vPJxXLT2CQoLm2v0vQGmD:5JpJlAN93vPjn24mhv
Threatray 3'773 similar samples on MalwareBazaar
TLSH T10BC4E010B7A0C035F1F766F8497AA3A8A53E79A1672490CF23C51AEE57346E1EC3135B
File icon (PE):PE icon
dhash icon 9cfcfcf8e8e8e066 (1 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
50f3588df57df36f71786cb7fd2876fd.exe
Verdict:
Malicious activity
Analysis date:
2021-10-13 17:40:25 UTC
Tags:
stealer loader trojan raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed stop
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Self deletion via cmd delete
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-10-13 15:21:50 UTC
AV detection:
22 of 41 (53.66%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:f101b8d36e5dba77385a11565177c9403f6a2964 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
4c49409a8cfca2ef69ebc5fc912c1f03613750c5df0b5546d9322db8d2b6f79f
MD5 hash:
6674ba89886f07b60acb2bc7bf6e70d1
SHA1 hash:
e5a685124679187d33b317091b7fd26d9931b10f
Detections:
win_raccoon_auto
SH256 hash:
4701e82080bbf43bfaf8dee522b66e11ee9029154eca770701e34e3a7822f263
MD5 hash:
50f3588df57df36f71786cb7fd2876fd
SHA1 hash:
e9008ea9e6da7547fa1d8914d9d2d77cb3977e36
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 4701e82080bbf43bfaf8dee522b66e11ee9029154eca770701e34e3a7822f263

(this sample)

  
Delivery method
Distributed via web download

Comments