MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52693062f8af884f53bc708c947256273d6362ba955b5b16653557f80150925c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 52693062f8af884f53bc708c947256273d6362ba955b5b16653557f80150925c
SHA3-384 hash: b2d5093376b6491f85b35ba8ecdd9a490eb0610683c4fde6a501af9ce148335778c94b06e5dabee8e9036a9428f54680
SHA1 hash: 0c1d555c2daddb0e6528a2800ff973ea8335f841
MD5 hash: 1bce563f5e72b35bc1d2b0c9429c503b
humanhash: wolfram-mars-angel-hydrogen
File name:SecuriteInfo.com.Trojan.Siggen12.47248.16606.23670
Download: download sample
Signature RaccoonStealer
File size:72'704 bytes
First seen:2021-03-22 06:46:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 768:idTddyzeY8phVbizLDQ9ANxKeE3R4ekDlEJJJJJJJJJJJJJJJJJcgll3YELFBk6L:/lJE460sseeQXJH4CfK/CUcgQIg
Threatray 3 similar samples on MalwareBazaar
TLSH 5063284132A8DA17C57852F5C47250F057BA6E01E571EACF2CDA78CA7AF6B120B82A47
Reporter SecuriteInfoCom
Tags:RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PlayerUI.exe
Verdict:
Malicious activity
Analysis date:
2021-03-19 20:20:52 UTC
Tags:
evasion trojan loader stealer autoit vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% directory
Sending an HTTP GET request
DNS request
Using the Windows Management Instrumentation requests
Creating a file
Creating a process from a recently created file
Sending a UDP request
Connecting to a non-recommended domain
Deleting a recently created file
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Searching for the window
Delayed reading of the file
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Stealing user critical data
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon Socelars
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Raccoon Stealer
Yara detected Socelars
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 372635 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 22/03/2021 Architecture: WINDOWS Score: 100 147 Found malware configuration 2->147 149 Malicious sample detected (through community Yara rule) 2->149 151 Antivirus detection for URL or domain 2->151 153 7 other signatures 2->153 12 SecuriteInfo.com.Trojan.Siggen12.47248.16606.exe 17 6 2->12         started        17 MicrosoftqcobWSQ6LbzKVgTskdpyTDShUpdater.exe 16 6 2->17         started        19 MicrosoftlF0aqJx7LD 20FVLT5Pd3p0rUpdater.exe 2->19         started        21 3 other processes 2->21 process3 dnsIp4 135 108.167.143.77 UNIFIEDLAYER-AS-1US United States 12->135 137 103.155.92.70 TWIDC-AS-APTWIDCLimitedHK unknown 12->137 145 14 other IPs or domains 12->145 109 C:\Users\...\UWRG2KOLOdhzuLYl9T4LeM0v.exe, PE32 12->109 dropped 111 MicrosoftqcobWSQ6L...kdpyTDShUpdater.exe, PE32 12->111 dropped 113 MicrosoftqcobWSQ6L...exe:Zone.Identifier, ASCII 12->113 dropped 173 Drops PE files to the document folder of the user 12->173 175 Creates multiple autostart registry keys 12->175 23 UWRG2KOLOdhzuLYl9T4LeM0v.exe 24 12->23         started        139 104.21.66.169 CLOUDFLARENETUS United States 17->139 141 192.168.2.1 unknown unknown 17->141 115 C:\Users\...115fSRZzIGgIzllzOWXOQD6el1.exe, PE32 17->115 dropped 123 2 other malicious files 17->123 dropped 28 NfSRZzIGgIzllzOWXOQD6el1.exe 17->28         started        117 C:\Users\...\TInQLYHyhdNxnVlXNBWj4kns.exe, PE32 19->117 dropped 125 2 other malicious files 19->125 dropped 30 TInQLYHyhdNxnVlXNBWj4kns.exe 19->30         started        143 104.23.99.190 CLOUDFLARENETUS United States 21->143 119 C:\Users\...\HNMhQPE0KjoXgbrVXW8osbo0.exe, PE32 21->119 dropped 121 MicrosoftZuqgG JvA...opOpjgyrUpdater.exe, PE32 21->121 dropped file5 signatures6 process7 dnsIp8 131 34.89.220.179 GOOGLEUS United States 23->131 91 C:\Users\user\AppData\...\76803500872.exe, PE32 23->91 dropped 93 C:\Users\user\AppData\...\61432420911.exe, PE32 23->93 dropped 159 Detected unpacking (changes PE section rights) 23->159 161 Detected unpacking (overwrites its own PE header) 23->161 32 cmd.exe 1 23->32         started        34 cmd.exe 23->34         started        36 cmd.exe 23->36         started        133 91.200.41.57 HVOSTING-ASUA Ukraine 28->133 95 C:\Users\user\AppData\...\74908915490.exe, PE32 28->95 dropped 97 C:\Users\user\AppData\...\16812210672.exe, PE32 28->97 dropped 107 2 other files (none is malicious) 28->107 dropped 38 cmd.exe 28->38         started        40 cmd.exe 28->40         started        42 cmd.exe 28->42         started        99 C:\Users\user\AppData\...\23606443888.exe, PE32 30->99 dropped 101 C:\Users\user\AppData\Local\...\null[1], PE32 30->101 dropped 103 C:\Users\user\AppData\Local\...\file[1].exe, PE32 30->103 dropped 105 C:\Users\user\AppData\Local\...\null[1], PE32 30->105 dropped file9 signatures10 process11 process12 44 61432420911.exe 32->44         started        47 conhost.exe 32->47         started        49 76803500872.exe 34->49         started        51 conhost.exe 34->51         started        57 2 other processes 36->57 53 74908915490.exe 38->53         started        55 conhost.exe 38->55         started        59 2 other processes 40->59 61 2 other processes 42->61 signatures13 163 Detected unpacking (changes PE section rights) 44->163 165 Detected unpacking (overwrites its own PE header) 44->165 167 Contains functionality to inject code into remote processes 44->167 63 61432420911.exe 44->63         started        169 Tries to harvest and steal browser information (history, passwords, etc) 49->169 171 Injects a PE file into a foreign processes 53->171 66 74908915490.exe 53->66         started        68 cmd.exe 59->68         started        process14 signatures15 177 Injects a PE file into a foreign processes 63->177 70 61432420911.exe 63->70         started        75 74908915490.exe 66->75         started        process16 dnsIp17 127 195.201.225.248 HETZNER-ASDE Germany 70->127 129 34.91.189.70 GOOGLEUS United States 70->129 83 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 70->83 dropped 85 C:\Users\user\AppData\...\vcruntime140.dll, PE32 70->85 dropped 87 C:\Users\user\AppData\...\ucrtbase.dll, PE32 70->87 dropped 89 56 other files (none is malicious) 70->89 dropped 155 Tries to steal Mail credentials (via file access) 70->155 157 Tries to harvest and steal browser information (history, passwords, etc) 70->157 77 cmd.exe 70->77         started        file18 signatures19 process20 process21 79 conhost.exe 77->79         started        81 timeout.exe 77->81         started       
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-03-20 06:40:02 UTC
AV detection:
22 of 47 (46.81%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:vidar botnet:c46f13f8aadc028907d65c627fd9163161661f6c backdoor discovery evasion infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Maps connected drives based on registry
Drops startup file
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Sets service image path in registry
UPX packed file
VMProtect packed file
Checks for common network interception software
Raccoon
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Unpacked files
SH256 hash:
52693062f8af884f53bc708c947256273d6362ba955b5b16653557f80150925c
MD5 hash:
1bce563f5e72b35bc1d2b0c9429c503b
SHA1 hash:
0c1d555c2daddb0e6528a2800ff973ea8335f841
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 52693062f8af884f53bc708c947256273d6362ba955b5b16653557f80150925c

(this sample)

  
Delivery method
Distributed via web download

Comments