MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5bdacdc106dccb1068826353c41ec72f533718cf09a398a0b5966f40d9863165. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 14
| SHA256 hash: | 5bdacdc106dccb1068826353c41ec72f533718cf09a398a0b5966f40d9863165 |
|---|---|
| SHA3-384 hash: | c60101fe05ba129a3632139c619b4defd1ae27cdefbd6f360a51c48ff1da2394421400cdf0cdead4cfe4eb799200d953 |
| SHA1 hash: | e0f6e3bda3739865125f62bebcdc6457af32bf9c |
| MD5 hash: | 54f514d1a984a45bfa635e33b6e097a1 |
| humanhash: | mirror-uranus-carolina-april |
| File name: | 54f514d1a984a45bfa635e33b6e097a1 |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 422'400 bytes |
| First seen: | 2021-08-09 04:16:16 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 00a47d6be4445a02dce374ef34dd9b76 (3 x RaccoonStealer, 1 x DanaBot) |
| ssdeep | 12288:q5VcdY1POjU8cB06VtORB1tDT8Qk7MQnELO:RAPBBFVtqtDTDk7XE |
| Threatray | 1'664 similar samples on MalwareBazaar |
| TLSH | T186941205F770CA33D4C621301C3DF6A096F96D321BB19947BF9A2B1E1E693E15E2931A |
| dhash icon | 1072c091b0381802 (1 x RaccoonStealer) |
| Reporter | |
| Tags: | 32 exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://74.119.195.134/ | https://threatfox.abuse.ch/ioc/166044/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_Raccoon |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Raccoon/Racealer infostealer |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://194.26.29.184/racoon.exe