MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4ebc4d4af4365a232d1e5aeb7a60a89208abdf07e1dd2dbc0bb8e781737d119f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | 4ebc4d4af4365a232d1e5aeb7a60a89208abdf07e1dd2dbc0bb8e781737d119f |
|---|---|
| SHA3-384 hash: | 1d3deecbc417d8cda41e736ec11dbbf3e0e289f35d8f6d3c9b6b8e37e436fc30de59e79bbae814169c2e0bfe14dfffcc |
| SHA1 hash: | 58d235fe227369457ef1260e485c615b32cec165 |
| MD5 hash: | e7f437d3ebee9ef2755f2287a227b544 |
| humanhash: | foxtrot-ohio-summer-golf |
| File name: | e7f437d3ebee9ef2755f2287a227b544.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 521'728 bytes |
| First seen: | 2021-11-08 13:41:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 60ab4a93298436a0ea920c16b7e59caa (8 x RaccoonStealer, 3 x RedLineStealer, 1 x Smoke Loader) |
| ssdeep | 12288:g3npqUrL9H0eLwT+UiPmOzL0+l9Punn5:UQOLt0eLwCjPvL0wo5 |
| Threatray | 4'098 similar samples on MalwareBazaar |
| TLSH | T13FB4F130A6E8D436E0633D30597196A11A77BD5255707046E380EBBF2E73E9C8AE631F |
| File icon (PE): | |
| dhash icon | fcfcb4d4d4dcd8c0 (14 x RedLineStealer, 11 x RaccoonStealer, 3 x Smoke Loader) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://194.180.174.182/ | https://threatfox.abuse.ch/ioc/245154/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_Raccoon |
|---|---|
| Author: | ditekSHen |
| Description: | Raccoon stealer payload |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.