MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 58177414ce7cded267953804df02097df17d2ca711c175bc9a1d9c0681cc3093. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | 58177414ce7cded267953804df02097df17d2ca711c175bc9a1d9c0681cc3093 |
|---|---|
| SHA3-384 hash: | 4881fed01147ffdc2a32da32b3aab28060ec3434295827f1b2d152626f929e03ffa913f86e07e1e17b859d233ebdffc6 |
| SHA1 hash: | 60bc25523bfe7d255caf0e8ad1ad56f584a5ce0b |
| MD5 hash: | 5825bd27ab8d574694cbabdeeeb24e5c |
| humanhash: | monkey-island-california-whiskey |
| File name: | 5825bd27ab8d574694cbabdeeeb24e5c.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 580'096 bytes |
| First seen: | 2021-11-13 23:01:04 UTC |
| Last seen: | 2021-11-14 01:09:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ed1b1d17b38d0dd027b889df8df37758 (10 x RaccoonStealer, 4 x Smoke Loader) |
| ssdeep | 12288:TjacPJHEk5uzVED11GM6LA0p73NNFoeCqUz4O21bFU8mN3urKp:pmwuZzMh0F3NNUhh2eu |
| Threatray | 4'141 similar samples on MalwareBazaar |
| TLSH | T151C4D000B7A0C035F5B766F949B69268B52B7DE1AB35A0CF52C53AED86346E0EC30717 |
| File icon (PE): | |
| dhash icon | e0e8e8e8aa66a489 (8 x RaccoonStealer, 6 x RedLineStealer, 2 x Tofsee) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://185.163.47.175/ | https://threatfox.abuse.ch/ioc/247972/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Raccoon
Result
Verdict:
Malware
Maliciousness:
Behaviour
DNS request
Sending a UDP request
Connection attempt
Sending a custom TCP request
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Connection attempt to an infection source
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccoon
Status:
Malicious
First seen:
2021-11-13 23:02:06 UTC
AV detection:
26 of 27 (96.30%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
raccoon
Similar samples:
+ 4'131 additional samples on MalwareBazaar
Result
Malware family:
raccoon
Score:
10/10
Tags:
family:raccoon botnet:6376eadae19f380741dabeeb94e58e106987305a stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
c83476f50235327d4389669a687880ca9fb1741906d7c26425eb02ceb8e53617
MD5 hash:
c23378fe6c68d7af30536bdb086aa642
SHA1 hash:
87255138d7760f93689f8ece85be378c57442735
Detections:
win_raccoon_auto
Parent samples :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 hash:
58177414ce7cded267953804df02097df17d2ca711c175bc9a1d9c0681cc3093
MD5 hash:
5825bd27ab8d574694cbabdeeeb24e5c
SHA1 hash:
60bc25523bfe7d255caf0e8ad1ad56f584a5ce0b
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.