MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d31c3b33070c5755724734a11b0a5b2e50838d5b4b78b275730d25f73c0b68c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 5d31c3b33070c5755724734a11b0a5b2e50838d5b4b78b275730d25f73c0b68c
SHA3-384 hash: ed22592d55df7bb67dc340b302d7ad9bdbf9c56e31290c28d58a9a5e923560fb905c4d751b24d7bc66fe267b1f2a7468
SHA1 hash: 59473f97ce42436c905eca5695da90020d3be2d7
MD5 hash: 1f4820f4dd23a7ea81fbdd096b3f5b59
humanhash: vermont-yankee-pip-india
File name:1f4820f4dd23a7ea81fbdd096b3f5b59.exe
Download: download sample
Signature RaccoonStealer
File size:4'122'112 bytes
First seen:2023-01-04 12:48:34 UTC
Last seen:2023-01-04 14:31:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 64e1066f3445adea52054d49fbbd46fe (1 x RaccoonStealer)
ssdeep 98304:oDswblD8ifUIRCS6g2B8LYy2qydNZM0a09job:Zwf9z6gL19yLZM0a09
Threatray 367 similar samples on MalwareBazaar
TLSH T15A16233752692259C4E8DC3EC537BE8471F9032B0642B8B475FBBDC324725EAE613992
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
226
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1f4820f4dd23a7ea81fbdd096b3f5b59.exe
Verdict:
Malicious activity
Analysis date:
2023-01-04 12:51:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file
Launching a process
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Enabling autorun by creating a file
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 777863 Sample: x6HulcBTBD.exe Startdate: 04/01/2023 Architecture: WINDOWS Score: 80 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 PE file contains section with special chars 2->43 7 WindowsPaint-Ver2.4.7.9.exe 2->7         started        10 x6HulcBTBD.exe 4 2->10         started        13 WindowsPaint-Ver2.4.7.9.exe 2->13         started        15 5 other processes 2->15 process3 file4 45 Antivirus detection for dropped file 7->45 47 Writes to foreign memory regions 7->47 49 Allocates memory in foreign processes 7->49 51 Injects a PE file into a foreign processes 7->51 17 vbc.exe 7->17         started        35 C:\...\WindowsPaint-Ver2.4.7.9.exe, PE32 10->35 dropped 37 WindowsPaint-Ver2....exe:Zone.Identifier, ASCII 10->37 dropped 53 Uses schtasks.exe or at.exe to add and modify task schedules 10->53 19 icacls.exe 1 10->19         started        21 icacls.exe 1 10->21         started        23 schtasks.exe 1 10->23         started        25 icacls.exe 1 10->25         started        signatures5 process6 process7 27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        31 conhost.exe 23->31         started        33 conhost.exe 25->33         started       
Threat name:
Win32.Trojan.Tasker
Status:
Malicious
First seen:
2023-01-03 21:34:24 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Modifies file permissions
Uses the VBS compiler for execution
Executes dropped EXE
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7ba68c2a8e8fafc261515b2bd544a9f10c43e4ba20114391e6a0d81cb1635d01
MD5 hash:
da3560e72399c3ecadf86a36ee677e92
SHA1 hash:
a06582a5260179ccec376aa13f19c885bc4f927a
SH256 hash:
5d31c3b33070c5755724734a11b0a5b2e50838d5b4b78b275730d25f73c0b68c
MD5 hash:
1f4820f4dd23a7ea81fbdd096b3f5b59
SHA1 hash:
59473f97ce42436c905eca5695da90020d3be2d7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 5d31c3b33070c5755724734a11b0a5b2e50838d5b4b78b275730d25f73c0b68c

(this sample)

  
Delivery method
Distributed via web download

Comments