MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 52034ff2764460d5cfb05b45b47d75fbb87c669814509f0699f02dafd869d871. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 13
| SHA256 hash: | 52034ff2764460d5cfb05b45b47d75fbb87c669814509f0699f02dafd869d871 |
|---|---|
| SHA3-384 hash: | a1897d7a28961522e8a9f8a09b03a86955f1c5bb9a8a1a20b76d8607ad392ea31cfbcd0bc714e8a92c259517979cf22d |
| SHA1 hash: | 74d9f661f249e37364264d56c8563e2f7a16f953 |
| MD5 hash: | e54a585f8f4a3274802213ce217046ff |
| humanhash: | johnny-chicken-uniform-whiskey |
| File name: | e54a585f8f4a3274802213ce217046ff.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 568'832 bytes |
| First seen: | 2021-10-01 07:11:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5ec7f7aedfe92c1b2393798c6fa1e0e0 (9 x RaccoonStealer, 3 x RedLineStealer, 2 x ArkeiStealer) |
| ssdeep | 6144:kNQbRc7WQAtY1lUhuUZiAc/tYzOOnbsGhR3T1r6xkBqeTsYpFy5yYYVhJ11+3VMP:kzvRlUssO8xRexivzrv1S3L63zxd6L |
| Threatray | 3'372 similar samples on MalwareBazaar |
| TLSH | T117C4F00931A2DFF2D27505F1AB27C7E1452E3E2C5E2A769A3B98361E3E3C391DA11345 |
| File icon (PE): | |
| dhash icon | 4839b234e8c38890 (121 x RaccoonStealer, 54 x RedLineStealer, 51 x ArkeiStealer) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://91.219.236.63/ | https://threatfox.abuse.ch/ioc/229384/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
ab52a71b3ffb4a0af77fb8d4bc687f9c296e20f78bac27e05e69ddd0e54446c7
25e9cccce341abac8cb2c2ea0aa426ebb6ce8e4f6bf41e95634067da50b090ba
ddc293e024821f0870ae59a138e5b9b78047fa2d109e954e18bdfdd6c3ac4c41
1493fc3f03016cd9d1c43c5e2e37ed2a618e0eadfcd35d4aff12f42e2e443813
5f15172014d5b28a6ef018dff8e184f8ccf6820720fac2c49114451255d89530
9cf88fe1e26029814e2d6877bd98604c88350d1899cd8adaa40dd7bf4b0303c7
c3f1a7f8584a3ace53e97f4b6289e13d3a41753364f12ae169c9fd4de2704610
6d0abd2378cf7fa2853d1b190c359ef7b256c83144b1aeae3af3036a6418554a
3e929304dd13990cc2fdb0673a8eac7387fac96052f76f9fd432c3fc7f04fd1d
485743b58458601c1947f2ef8d25cdca62b87ad6bbfda4841f7d49b31512cc8b
97a681f3d9aa34f1975a5ebf188ce6a1de9089f52a29d9dd912bc8dd61cb9d33
9a1d08d8158e5278734fc0a434e73ca6279e7586b0c1dfc3f7d71c6c76a9de0d
68c8034c163f04c237fae46f45b55ec1799f6305aa8bf3b2cc477a403c44fc17
00a0b4335a8d59371783a615f8c27dfba248ef0f393151935fc6ea6dbceeec6e
6aceac14e068c53ebe3a0dd3f0e1a8bcc34b39ce31ef96f3dfcfcfc2308d23eb
c4566f27e470e760bfe142ff7b8108e7f9b5e3203b01074ef98871bc559a9d5c
8eeada0e16192841fe64eef80bf8b10aaf2e8067b20b8f3e0b1835b2e8b92112
41a566737968422b7a43363b421dce92d5863004a360cbaaaa66a781b3faea5d
603405c0c3b8b1ff41052f7937e10d6bd82852a6e556c41d1d5d2d29bc309335
198cd83ea6deafe4d242e7707c47ebbbec04c5debc90cc94f58fe0b2a60f723b
ebfc2335b28375c29d6a1423b5251a2ff91af8da24400fa341cb44d0ef906404
f2003d2fa7f7d22caee50d4c6f4c8aa4ff9a8ab6010c94d1629a86ce57a52a76
9087412ce39a9f4988bb6d7e50018d3f1154e29f4edfc9d4f1d7b87609402bc0
2f289065f7cc6427f609df03d336c1e9626229ba90deb3bc37166c12851bde96
dec0265226f1b0fcbcd3570d1fabb2b97a26b0fa575026782f169e7d1d282df5
b801d034286a43912a28ec748b3c9f423f1b601e0e0a46d80cce30aa9eba021e
b178ddb0e5a5d3bc285ac8ef18f5d46c2e706780b7e2a656d697352a99cbfc60
e6f3e1291f3494f364778772237bdbf4a3c943c64cde34b53a2ab6d809fd5ae8
8254c31e4d719d26ca5d6991907bb0f84f394d03f33ae37aba1e8fd430edc786
37ce68189b52816d655532e2723304771fcb89ea074b8af94c34e1062d581397
6f59f808e8e8d2a2d8f6c771ac2270800cd02abbc7ea4274b896e1b72143aab2
a6fd5456fcd9d23bebc37c813f0208c7187a9e39263c197b3faae0d56ee60c33
03e733b945ade5db2e556118d728a9e1b88b8d2e53b6151ca78ef84aebdb0906
70d0690f7740be76d6c2b2f62ee5cbbe594337cda04254df881915c4f834dbfc
cefc15cd378028ea0655c1783c84b4a08a17bf5e9439bb3acb9b9f6f0199d603
671d36b162c116fd9d3276fc9010e4b39062a4f48bc47ab980059eef1b375a12
eed9f58f3d2334ac8297cfa62548cd9dbdb05f13d92fb86fa4ed77d1cd35889d
3481a1686a8c1b76d6b8e2b4c1663761dfccb13fb69e74a8767b1dd5dd7186e0
8f39a55bac3dd179742fd700126feaba77ad66b5e4666cb81d9fc9a561396e52
18c798282da89986a2aeaf8b9d85e4f3d70e991dc5186937f40e6802be3da549
5cd6d407701a56e39d3419a3b0eed380ec7a4949987471294dff731d7827dffa
13a34940ea842b8115ea03a8ed84f8af6dc0b9f1808b95f275025007c4367bae
658232b7dc41c07c874649e2c83ed12a1db65473e73eb4a1beea82aaea2abb49
76a6295a7b1e6854ab42e24d1ecca629d45203fb759575dad0fdb5e2e3150ee9
d9f65ba858b895b3b899ed93950ad1fcc2f3af8c2bb7840d4774bf46384d05ad
e9abda09ff147a91ceacf0184069126f12fab01933ddda7a99357035a3108dc8
e3195b8479376b3fa5a9f0d75a4d602abcb9ab66b0ff72cc8359a9db3d430e12
8a50273435f6be7e9a3260ee25ef07ec04c856c239d39830a12145daec79371e
52034ff2764460d5cfb05b45b47d75fbb87c669814509f0699f02dafd869d871
030fb78d33341248ef601687348219db846b7fc453af8cb96384c523e9cfa6e4
e108e203e4b31615afcf88bddfed51dd499f6a1628fa93b7d9072400259ecc5b
e12ddd7e3b609ead47bc67b97ab84d69bf1a4889bd99c10e43bd32676b4bf7d2
fdb27f7102e4d832324d6ac9288a08b762d86cb5641d39786969409056a28a9e
8110f71c730733b4b70ef735eaff8a5c2014f50bc0d509cad5914f339fd2fead
8d1291bb7b68fc7be0b6b189da47d3bb709230c0c3e0658f4a30687e32ef3f1e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.