MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 587e0fb4dfa654fa10eb322756fee3ed5fb0d7c5e903a0f3e97812a821d8f13f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 13
| SHA256 hash: | 587e0fb4dfa654fa10eb322756fee3ed5fb0d7c5e903a0f3e97812a821d8f13f |
|---|---|
| SHA3-384 hash: | 9ad9d123bc7ef33948acf8d01231cc85bf7c001fff34762deada640c3cbad88771e77d58248ffedca03a89cb27a82fdd |
| SHA1 hash: | 1fd3aff485b9af228894a560cfd6f6f9eb142b17 |
| MD5 hash: | f2710804050ae52b971441e51ceb44f8 |
| humanhash: | florida-fix-fillet-burger |
| File name: | f2710804050ae52b971441e51ceb44f8.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 546'816 bytes |
| First seen: | 2021-09-03 05:35:48 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f98082b3dd4af392746814cb64f8deec (2 x RaccoonStealer, 1 x Glupteba, 1 x Amadey) |
| ssdeep | 12288:ajIN5UY0Hw+7anByTaLxeLMWYi8kFcGD6ROEDdMIwJpewcinYXaKmV6:hUY0Hw+7/MWYWmGD6RODpezinYXa3V6 |
| Threatray | 2'791 similar samples on MalwareBazaar |
| TLSH | T16DC4E020BAA0C435E4E713F558B987A8AB297DB15B2440DF62C637AE17346E4DC3067F |
| dhash icon | ead8ac9cc6e68ee0 (118 x RaccoonStealer, 102 x RedLineStealer, 46 x Smoke Loader) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://5.181.156.221/ | https://threatfox.abuse.ch/ioc/213378/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
e86a4604ef8b8aa51de835f29953cee41ab8ebdbb0a67c820ab37f2642237e77
cb0431843a465580af16a0fd3eac32bab34c3e52ee3951a50ac3d4c0d709d730
f6fa1e0673d37677b081dfe83a4a693038ce0a68d7c4715a3ee8f2086e3b64c1
69148105747e1f74106dfb122777b7b91ea987e691403d1e13e2a290158f5260
eb711eee5afe353053bb43ba1f4dc8f3892b471f16c79a28c9bef8f974019fd8
ea435f8deba53b4fd4a17dfd99f6d41ec709667aa0c79fd2ba8d5e896e93a0e3
f006a4c59daf7922ed92456c39741cd47d0c7e277473551a7b78442b2bec29a4
377d7bd0bb633c59150a6166eb415c8ecfea50076139ec717c263e10b50869f3
4242c220acc9cf21fad9e94af84777d0dabcaa7e7d828d604c780c276be87bdd
587e0fb4dfa654fa10eb322756fee3ed5fb0d7c5e903a0f3e97812a821d8f13f
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.