MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6676daa5ac462be5ab9db5b70a82e2fc6583b9ec2eaad6bc176ddb61ef08c5e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 6676daa5ac462be5ab9db5b70a82e2fc6583b9ec2eaad6bc176ddb61ef08c5e5
SHA3-384 hash: 938617bd42dbc4578734badefcd2dc792702f9a6b5baec9fed87fc5facb20957ac7ca6c753968e59b7939cf28fed266e
SHA1 hash: efe3b29f5c015993a46ea3aac3e50c377e2c2e0a
MD5 hash: 7a34b0a71978839c0f1b67ddecce33e1
humanhash: football-ohio-high-april
File name:7a34b0a71978839c0f1b67ddecce33e1.dll
Download: download sample
Signature RaccoonStealer
File size:8'531'968 bytes
First seen:2023-11-26 18:25:07 UTC
Last seen:2023-11-26 20:54:37 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 1620a4502dccef1905f8a7cf281e66b9 (3 x RaccoonStealer)
ssdeep 196608:PLejSGJHFn+3Yh8gZRZuuwRx5n6eRBjlH8G0xeOO0e8YP:yeGJMSZu9Rx56eRBZ8G2RO0X
TLSH T1588623A391541088EDEA8B3DC1377DA531F33F6A8AB098BDA495B5C127735E2C623D43
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.5% (.EXE) Win32 Executable (generic) (4505/5/1)
8.4% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 9e77535b719fd382 (3 x RaccoonStealer)
Reporter abuse_ch
Tags:dll RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
330
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
lolbin packed packed packed shell32 vmprotect
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
84 / 100
Signature
Detected VMProtect packer
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with function prologues
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1348099 Sample: t3CNhrFqlK.dll Startdate: 26/11/2023 Architecture: WINDOWS Score: 84 25 Multi AV Scanner detection for submitted file 2->25 27 Detected VMProtect packer 2->27 29 Machine Learning detection for sample 2->29 31 Initial sample is a PE file and has a suspicious name 2->31 7 loaddll32.exe 1 2->7         started        process3 signatures4 37 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->37 39 Overwrites code with function prologues 7->39 41 Tries to detect virtualization through RDTSC time measurements 7->41 10 rundll32.exe 7->10         started        14 rundll32.exe 7->14         started        16 cmd.exe 1 7->16         started        18 conhost.exe 7->18         started        process5 dnsIp6 23 47.110.247.171, 49704, 49705, 49706 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 10->23 43 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->43 45 Overwrites code with function prologues 10->45 47 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->47 49 Tries to detect virtualization through RDTSC time measurements 10->49 51 System process connects to network (likely due to code injection or exploit) 14->51 20 rundll32.exe 16->20         started        signatures7 process8 signatures9 33 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 20->33 35 Overwrites code with function prologues 20->35
Threat name:
Win32.Trojan.Ursu
Status:
Malicious
First seen:
2023-11-12 03:33:04 UTC
File Type:
PE (Dll)
Extracted files:
7
AV detection:
16 of 37 (43.24%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
raccoon
Result
Malware family:
n/a
Score:
  8/10
Tags:
vmprotect
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
VMProtect packed file
Blocklisted process makes network request
Unpacked files
SH256 hash:
6676daa5ac462be5ab9db5b70a82e2fc6583b9ec2eaad6bc176ddb61ef08c5e5
MD5 hash:
7a34b0a71978839c0f1b67ddecce33e1
SHA1 hash:
efe3b29f5c015993a46ea3aac3e50c377e2c2e0a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

DLL dll 6676daa5ac462be5ab9db5b70a82e2fc6583b9ec2eaad6bc176ddb61ef08c5e5

(this sample)

  
Delivery method
Distributed via web download

Comments