MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67a6bcb12b0266f41f7b9645845eb788d83ba56edd8221a8c053f6a5aa413347. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 5 File information Comments

SHA256 hash: 67a6bcb12b0266f41f7b9645845eb788d83ba56edd8221a8c053f6a5aa413347
SHA3-384 hash: c7ac7d80ff51fd60038e00514e02b859b69f2ee6a8811307221ad7decd6318a42b0a9b3ab8d8d161656eb274f4a12ea1
SHA1 hash: 2c72fd89917cb8ce69b7402eef83ad081d90000e
MD5 hash: a0f624e022f3e8a0d1e30d104b2ca038
humanhash: lemon-gee-zebra-hotel
File name:a0f624e022f3e8a0d1e30d104b2ca038.exe
Download: download sample
Signature RaccoonStealer
File size:1'043'968 bytes
First seen:2022-03-25 21:00:36 UTC
Last seen:2024-07-24 15:17:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:WHQCMMHMonDKwzuONn5dvdPvGY38qGykJ:FazKgn5dvQhyk
TLSH T12D25BE4FE12ADF73D91969F9C5287629BF8BA04C51F2D315290DACAF30BA3149C91372
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://185.163.204.219/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.163.204.219/ https://threatfox.abuse.ch/ioc/450101/

Intelligence


File Origin
# of uploads :
3
# of downloads :
272
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
67a6bcb12b0266f41f7b9645845eb788d83ba56edd8221a8c053f6a5aa413347.zip
Verdict:
Malicious activity
Analysis date:
2022-03-25 21:12:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Adding an access-denied ACE
Launching a process
Сreating synchronization primitives
DNS request
Creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed racealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains functionality to steal Internet Explorer form passwords
DLL side loading technique detected
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected Raccoon Stealer
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-03-23 03:29:33 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
23 of 42 (54.76%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
raccoon
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:10bc59defd080e507172a4d9c77e417a0f964c80 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Raccoon
Unpacked files
SH256 hash:
3058ea85e8d97a6a92f938639cccd669cda10830ebbf5fab5c723c6e175cd2a1
MD5 hash:
87f44938037f289481182f17d146140e
SHA1 hash:
c71584045174bee9e98f1e00cf5414bbca82f7cd
SH256 hash:
771fbd9c739e8b94783ef347b5b419c837a1001ecfee7edd15679d2bf57a5551
MD5 hash:
79665a607fda18c034c267abaa0bd128
SHA1 hash:
a22a674d237c2f7826636d8c26b623c587dabb03
Detections:
win_raccoon_auto
SH256 hash:
a251e4f9dd9fc731aaaa3fb7b21aca48f31354bf77dc851c56e1c800732e157c
MD5 hash:
39ac7ceac22d88e5bf70e7963e20dc79
SHA1 hash:
6456abc94d33ca51eea81aec4e5c56b1d8089965
SH256 hash:
70b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082
MD5 hash:
5951b52c9b4d11ca7f4f33e5a3fb2c31
SHA1 hash:
0bc54fd699fff7b93e5c447a141c0d904924ab0d
SH256 hash:
31cf0360d22d1457a8c78cb5d846d00b42b2e604f7db5d4ddb120815634b9f67
MD5 hash:
af02d7cf608bb1bf9c16a33a379459b6
SHA1 hash:
067dcd39f3421072f2d68ee0b0b8355d4ab66a2f
SH256 hash:
67a6bcb12b0266f41f7b9645845eb788d83ba56edd8221a8c053f6a5aa413347
MD5 hash:
a0f624e022f3e8a0d1e30d104b2ca038
SHA1 hash:
2c72fd89917cb8ce69b7402eef83ad081d90000e
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments