MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67e030c1c7dd08138eb1d6a12a4d652c4a304f22db556afce411c32a23bddf23. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs 3 YARA 7 File information Comments

SHA256 hash: 67e030c1c7dd08138eb1d6a12a4d652c4a304f22db556afce411c32a23bddf23
SHA3-384 hash: 72f74fb95d1dd2b371d210b67bb42b08bc4f073b8fea7f747e36a99f2476054f976e5b5bb9d94c3666018c9c10da8658
SHA1 hash: 3234b9edcd1ff528bd32dab60aaed001f53c19fb
MD5 hash: b10d7186f4a2d0655f2f6a38e4eb9c6e
humanhash: lemon-iowa-avocado-low
File name:b10d7186f4a2d0655f2f6a38e4eb9c6e.exe
Download: download sample
Signature RaccoonStealer
File size:9'808'087 bytes
First seen:2022-01-22 18:45:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JCJhQjNtKF2tSdZbHrSUsJA3dLCQydYebWttjwf6ebc3Q:JdjNtK9SFJA3dLCfIttje5
TLSH T171A63355D9A25582C342AA3B49325824681CA2A39F54D46EB33F1F6B5B3F2F13EC74F0
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
185.105.119.120:48759

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.105.119.120:48759 https://threatfox.abuse.ch/ioc/311270/
148.251.189.166:11784 https://threatfox.abuse.ch/ioc/313092/
91.243.59.147:33459 https://threatfox.abuse.ch/ioc/313093/

Intelligence


File Origin
# of uploads :
1
# of downloads :
419
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b10d7186f4a2d0655f2f6a38e4eb9c6e.exe
Verdict:
No threats detected
Analysis date:
2022-01-22 18:55:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys clipbanker control.exe mokes overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 558192 Sample: ev8zhBsCzU.exe Startdate: 22/01/2022 Architecture: WINDOWS Score: 100 78 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 2->78 80 103.155.92.143 TWIDC-AS-APTWIDCLimitedHK unknown 2->80 82 24 other IPs or domains 2->82 88 Multi AV Scanner detection for domain / URL 2->88 90 Antivirus detection for URL or domain 2->90 92 Antivirus detection for dropped file 2->92 94 22 other signatures 2->94 10 ev8zhBsCzU.exe 10 2->10         started        signatures3 process4 file5 52 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->52 dropped 13 setup_installer.exe 26 10->13         started        process6 file7 54 C:\Users\user\AppData\...\setup_install.exe, PE32 13->54 dropped 56 C:\Users\user\AppData\...\Wed02f19c3e1513.exe, PE32 13->56 dropped 58 C:\Users\user\AppData\...\Wed02bf29db7f.exe, PE32 13->58 dropped 60 19 other files (12 malicious) 13->60 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 62 172.67.186.11 CLOUDFLARENETUS United States 16->62 64 127.0.0.1 unknown unknown 16->64 84 Adds a directory exclusion to Windows Defender 16->84 86 Disables Windows Defender (via service or powershell) 16->86 20 cmd.exe 16->20         started        22 cmd.exe 16->22         started        24 cmd.exe 1 16->24         started        26 8 other processes 16->26 signatures10 process11 signatures12 29 Wed02978fe87cbd64.exe 20->29         started        32 Wed028bdb3292.exe 22->32         started        36 Wed02bf29db7f.exe 24->36         started        96 Adds a directory exclusion to Windows Defender 26->96 98 Disables Windows Defender (via service or powershell) 26->98 38 Wed02a8031c49240176f.exe 26->38         started        40 Wed0247e7205ae49a4.exe 26->40         started        42 Wed0211c33fcc5.exe 26->42         started        44 3 other processes 26->44 process13 dnsIp14 100 Antivirus detection for dropped file 29->100 102 Machine Learning detection for dropped file 29->102 104 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 29->104 116 2 other signatures 29->116 66 104.21.34.205 CLOUDFLARENETUS United States 32->66 46 fabc19fc-ba05-411e-adbd-6ef85287029f.bin, MS-DOS 32->46 dropped 48 4cd6b57f-1ef6-4312-948c-f8b6c2cba5ea.bin, MS-DOS 32->48 dropped 50 46f296d6-d170-4e1b-95d7-dfd11c8d3a02.bin, MS-DOS 32->50 dropped 106 Detected unpacking (changes PE section rights) 32->106 108 Sample uses process hollowing technique 36->108 110 Injects a PE file into a foreign processes 36->110 68 148.251.234.83 HETZNER-ASDE Germany 38->68 70 8.8.8.8 GOOGLEUS United States 38->70 72 162.159.129.233 CLOUDFLARENETUS United States 38->72 112 Detected unpacking (overwrites its own PE header) 38->112 74 212.193.30.45 SPD-NETTR Russian Federation 40->74 114 Multi AV Scanner detection for dropped file 40->114 76 192.168.2.1 unknown unknown 42->76 file15 signatures16
Threat name:
Win32.Trojan.ClipBanker
Status:
Malicious
First seen:
2022-01-19 03:32:00 UTC
File Type:
PE (Exe)
Extracted files:
713
AV detection:
30 of 43 (69.77%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:onlylogger family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:8fc55a7ea41b0c5db2ca3c881e20966100c28a40 botnet:915 botnet:media24nps botnet:v3user1 aspackv2 backdoor evasion infostealer loader spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
159.69.246.184:13127
65.108.69.168:13293
Unpacked files
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
aaa6e23b5293d520af3ce58810a337ae77f60248ffbf8d98dd2a660a7c65bb49
MD5 hash:
b92181383c35f848f36bf77962afbf12
SHA1 hash:
afe7be0e96f15900d3f6172d25f8efdcd5a7ece6
SH256 hash:
0e5d5642f0b7772d421e7f66e3be3be1ffc65b53984e1804be0c1b880ace1d89
MD5 hash:
475bfc05bc6ca7252447d87b49072a60
SHA1 hash:
9d3b468288be4b4c4c8aca313027b4cd27ac510b
SH256 hash:
e7b8877389f0bfb5fb95f08a799a0e7d06a2f7161a0287552ff3eadf06bd1dd1
MD5 hash:
e9eb471509abbfb4456285e82b25d1c9
SHA1 hash:
b96ef576c147ea8a1b3e0bd5430117ba9ad31096
SH256 hash:
2ea8a5fa993f274677e80d22a75a61f021494e6af66e7df4e4f7ca1d3b6f66a5
MD5 hash:
f2f37c6152b279bd5cdfd8d0d36c9bd7
SHA1 hash:
b8fd954bd3212ee30b4de07ef78a622ea321e143
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
0b5638c22a52187aee2e081ed21e9f06fffeb32434fa79e6bc682a7d43d61767
MD5 hash:
c51d1e2387dcc5b4f7070b2c4bb46c4e
SHA1 hash:
f25fda680034f3688b523fdfb4691995bf210bfa
Parent samples :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 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
aef95ccdc646c8542d08a54fb0a4301ca8401ddab823163ddf2038c26ecd49b7
MD5 hash:
5d1b28f53242c9d456f2a3b9c0999496
SHA1 hash:
13cc3f0fcd5c118c562cb4ccceef4f462a8f3e2d
SH256 hash:
4ed8fd6b621d35002abb9fc910bf558dc5d50fa4a5b2443997583ff0111761da
MD5 hash:
7ed61e89d7d2122e86ee9f84a375deeb
SHA1 hash:
082a30b758863fe0f1dbb4514a82104839bb8451
SH256 hash:
d200ac686131da8d0931c0a92939ddbd7083665b9cb95c80bf4d90dddc9ca06c
MD5 hash:
578086887428a16886d283ef48fe5aa6
SHA1 hash:
8e3e908d6f9ac40078976f717678bba6c5179be0
SH256 hash:
88db818c13bbf1ee862c7cab52cd185e7c2169e1eb3533ca4cce3b03c38e67e2
MD5 hash:
4a5e08784c8a58644c7e38ac79521bb9
SHA1 hash:
95a4b7928722167b522342db0bd14ab8b2707c3c
SH256 hash:
168aed927d32b49d88d37f7863419c49ce6bbfecf34d38eb98534e8f951cef4a
MD5 hash:
dd762bb89a138e8e28642c0a62f53bc6
SHA1 hash:
95a80447a2bb82dec2f296141cf73b8237e1fb7f
SH256 hash:
c33737eab79d9c62577520234a7e8d00c482aae788fcad3b8f70821208abb2a6
MD5 hash:
d39a1f70eab9ffecea85b62f37c0970c
SHA1 hash:
5237db6fd2ed03eaf9c9e3c87229285867af69f5
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
67e030c1c7dd08138eb1d6a12a4d652c4a304f22db556afce411c32a23bddf23
MD5 hash:
b10d7186f4a2d0655f2f6a38e4eb9c6e
SHA1 hash:
3234b9edcd1ff528bd32dab60aaed001f53c19fb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments