MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 51785594b835ee188972c80f514ce698ed1262e0628c66df1d9e1ae23d484476. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 11
| SHA256 hash: | 51785594b835ee188972c80f514ce698ed1262e0628c66df1d9e1ae23d484476 |
|---|---|
| SHA3-384 hash: | 0500275bd080fb32d8bef008cf001f3828eb4948c95e880616e090d66598958d221495798931848bd20c2a39ebb64ed8 |
| SHA1 hash: | e40fb8967ab3ecf50d1cf4b52c0124c81b7d86f6 |
| MD5 hash: | bbd9760541fb80a439fe1447ff6cdf58 |
| humanhash: | moon-hotel-colorado-eighteen |
| File name: | bbd9760541fb80a439fe1447ff6cdf58.exe |
| Download: | download sample |
| File size: | 432'132 bytes |
| First seen: | 2021-11-04 17:21:57 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fbe4cce31825940f582af9763f8c6fb6 (4 x RaccoonStealer, 2 x RedLineStealer, 2 x Smoke Loader) |
| ssdeep | 12288:wmJ/eKgCO+BguIXK3pJ0Ba+QUfMf0FLsD9D5:wketFrg8ojUfMf0Fs |
| TLSH | T11F94011173B2D431D5E32F744930ABB21A3A782326B4519F2BB7EB7E1E607D01A71726 |
| File icon (PE): | |
| dhash icon | 480c1c4c4f590b14 (113 x Smoke Loader, 92 x RedLineStealer, 83 x Amadey) |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bbd9760541fb80a439fe1447ff6cdf58.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-04 17:30:26 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Raccoon
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
C2 URLs / IPs found in malware configuration
Found detection on Joe Sandbox Cloud Basic with higher score
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-11-04 17:22:07 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
5/5
Result
Malware family:
raccoon
Score:
10/10
Tags:
family:raccoon botnet:b3ed1d79826001317754d88a62db05820a1ecd19 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Raccoon
Unpacked files
SH256 hash:
25a4b6c6b34adf706411f6f6b91c46de7a80728964492e6eb11f2281e9678717
MD5 hash:
2f9b640b36cbd54b3c835289cc8075cd
SHA1 hash:
9e849ddf0cbb3291065a12408bc798c7cd7686d9
Detections:
win_raccoon_auto
SH256 hash:
51785594b835ee188972c80f514ce698ed1262e0628c66df1d9e1ae23d484476
MD5 hash:
bbd9760541fb80a439fe1447ff6cdf58
SHA1 hash:
e40fb8967ab3ecf50d1cf4b52c0124c81b7d86f6
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 51785594b835ee188972c80f514ce698ed1262e0628c66df1d9e1ae23d484476
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.