MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69281664db9f7088a1cdfbf5b3468170bdbeadeb3ce9f4db3ef114ef8828e870. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 16 File information Comments

SHA256 hash: 69281664db9f7088a1cdfbf5b3468170bdbeadeb3ce9f4db3ef114ef8828e870
SHA3-384 hash: 7ccab93314f771b2bc28b641820869e2e5e92e7b7a08002a9df6127e4680fea9434b0a54310e82e22c05aa8d5a4c7d57
SHA1 hash: ad6edd457e934cf3eafd1866b845b2f684f0a174
MD5 hash: 5af062f1cde00f04809a212a60017187
humanhash: mobile-iowa-salami-aspen
File name:5af062f1cde00f04809a212a60017187.exe
Download: download sample
Signature RaccoonStealer
File size:1'157'312 bytes
First seen:2021-01-26 06:32:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 061ddbe41a69b3676edebf6a92a5f06a (4 x RaccoonStealer, 1 x RemcosRAT)
ssdeep 24576:QQCemrx/IW4tfPmeuBO4GPDRwrbrtJerRMYEa0wz7UOX1hIVeoo8:QQCemrxw7IGPDRw3r7fYEa0wMOlhIVe+
Threatray 578 similar samples on MalwareBazaar
TLSH 5435F113AA254C03E5060E705AF287F6277DFC537A425E1FB748FA180DB2B862CD167A
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5af062f1cde00f04809a212a60017187.exe
Verdict:
Malicious activity
Analysis date:
2021-01-26 06:37:13 UTC
Tags:
trojan rat azorult stealer raccoon vidar loader remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% directory
Creating a process from a recently created file
DNS request
Creating a file
Deleting a recently created file
Reading critical registry keys
Creating a file in the %temp% directory
Replacing files
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT Azorult Raccoon Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Executable Used by PlugX in Uncommon Location
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM_3
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 344159 Sample: hG8XQh9hMy.exe Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 116 icacxndo.ac.ug 2->116 118 brudfascaqezd.ac.ug 2->118 120 2 other IPs or domains 2->120 140 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->140 142 Multi AV Scanner detection for domain / URL 2->142 144 Found malware configuration 2->144 146 18 other signatures 2->146 11 hG8XQh9hMy.exe 16 2->11         started        15 cmd.exe 2->15         started        17 taskkill.exe 2->17         started        signatures3 process4 file5 110 C:\Users\user\AppData\Roaming\ZBVetrcxv.exe, PE32 11->110 dropped 112 C:\Users\user\AppData\...\SghtyrFbvr.exe, PE32 11->112 dropped 170 Detected unpacking (changes PE section rights) 11->170 172 Detected unpacking (overwrites its own PE header) 11->172 174 Maps a DLL or memory area into another process 11->174 19 ZBVetrcxv.exe 4 11->19         started        22 hG8XQh9hMy.exe 87 11->22         started        26 SghtyrFbvr.exe 4 11->26         started        28 kvovse3d.exe 15->28         started        30 conhost.exe 15->30         started        32 conhost.exe 17->32         started        signatures6 process7 dnsIp8 148 Detected unpacking (changes PE section rights) 19->148 150 Maps a DLL or memory area into another process 19->150 34 ZBVetrcxv.exe 71 19->34         started        128 helpsavedogs.top 172.67.142.109, 443, 49729 CLOUDFLARENETUS United States 22->128 130 telete.in 195.201.225.248, 443, 49722 HETZNER-ASDE Germany 22->130 102 C:\Users\user\AppData\...\gjtDJ2ujcV.exe, PE32 22->102 dropped 104 C:\Users\user\AppData\...\nBWnGRELFC.exe, PE32 22->104 dropped 106 C:\Users\user\AppData\...\Zsq6oSvWeL.exe, PE32 22->106 dropped 108 60 other files (none is malicious) 22->108 dropped 152 Tries to steal Mail credentials (via file access) 22->152 39 gjtDJ2ujcV.exe 22->39         started        41 Zsq6oSvWeL.exe 22->41         started        43 Wlpqpj2Rja.exe 22->43         started        49 2 other processes 22->49 154 Detected unpacking (overwrites its own PE header) 26->154 45 SghtyrFbvr.exe 188 26->45         started        47 powershell.exe 26->47         started        file9 signatures10 process11 dnsIp12 122 dancedance.ac.ug 34->122 84 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 34->84 dropped 86 C:\Users\user\AppData\Local\Temp\ac.exe, PE32 34->86 dropped 88 C:\Users\user\AppData\Local\Temp\ds2.exe, PE32 34->88 dropped 98 49 other files (none is malicious) 34->98 dropped 158 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->158 160 Tries to steal Instant Messenger accounts or passwords 34->160 162 Tries to steal Mail credentials (via file access) 34->162 168 3 other signatures 34->168 51 ac.exe 34->51         started        54 rc.exe 34->54         started        68 2 other processes 34->68 90 C:\Users\user\AppData\Local\...\tmpDD25.tmp, XML 39->90 dropped 92 C:\Users\user\AppData\Roaming\LYffjU.exe, PE32 39->92 dropped 164 Injects a PE file into a foreign processes 39->164 57 gjtDJ2ujcV.exe 39->57         started        59 schtasks.exe 39->59         started        61 Zsq6oSvWeL.exe 41->61         started        124 cdn.discordapp.com 162.159.130.233, 443, 49735, 49743 CLOUDFLARENETUS United States 43->124 126 marianne.ac.ug 185.215.113.77, 49724, 49725, 49731 WHOLESALECONNECTIONSNL Portugal 45->126 94 C:\ProgramData\vcruntime140.dll, PE32 45->94 dropped 96 C:\ProgramData\sqlite3.dll, PE32 45->96 dropped 100 5 other files (none is malicious) 45->100 dropped 166 Tries to steal Crypto Currency Wallets 45->166 64 cmd.exe 45->64         started        66 conhost.exe 47->66         started        70 3 other processes 49->70 file13 signatures14 process15 dnsIp16 156 Injects a PE file into a foreign processes 51->156 72 schtasks.exe 51->72         started        132 cdn.discordapp.com 54->132 134 icacxndo.ac.ug 57->134 136 icando.ug 91.193.75.94, 49740, 49744, 49745 DAVID_CRAIGGG Serbia 57->136 138 192.168.2.1 unknown unknown 57->138 74 conhost.exe 59->74         started        114 C:\Windows\Temp\kvovse3d.exe, PE32 61->114 dropped 76 cmstp.exe 61->76         started        78 conhost.exe 64->78         started        80 taskkill.exe 64->80         started        file17 signatures18 process19 process20 82 conhost.exe 72->82         started       
Threat name:
Win32.PUA.KuaiZip
Status:
Malicious
First seen:
2021-01-23 17:35:42 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:azorult family:oski family:raccoon family:remcos discovery evasion infostealer persistence ransomware rat spyware stealer trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
JavaScript code in executable
Deletes itself
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
Async RAT payload
AsyncRat
Azorult
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Oski
Raccoon
Remcos
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
nothinglike.ac.ug:6969
brudfascaqezd.ac.ug:6969
icando.ug:6970
icacxndo.ac.ug:6970
Unpacked files
SH256 hash:
df009051d437c4d7953c89e900815983381cc9651f32636ef96a0c2f083353fc
MD5 hash:
694f085b5786752516a9d1638a71f47e
SHA1 hash:
34681876de36b3f7215c03a4c1f0b4481868dfec
Detections:
win_raccoon_auto
SH256 hash:
5c2582dc682447f4e58da894b8434f1f3e2fdb3b1f7c9dc97d6d0cf807ae2680
MD5 hash:
3ec1660387818ca1426c305d68dcf891
SHA1 hash:
69d06164fd6c85999f6c20169c71da5b4f10f48d
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
95416297606f2cf1197ef47b1a6525112ea55ce5b74717cc9e9354db86e2a003
MD5 hash:
6008b40f6aad9fea1431bc95b40bb71f
SHA1 hash:
c8267782f47f56fd9b732bd5afa3d846d27e5991
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
ecd9906d6d958fe435a29d419f69cd8e93b22e5fc00fab98bdcda17244b9a957
MD5 hash:
d33b26cd31f0092dc318f062fe56254d
SHA1 hash:
5b72aa5e13dc2de7120f742b381fa0b21eede7ea
SH256 hash:
69281664db9f7088a1cdfbf5b3468170bdbeadeb3ce9f4db3ef114ef8828e870
MD5 hash:
5af062f1cde00f04809a212a60017187
SHA1 hash:
ad6edd457e934cf3eafd1866b845b2f684f0a174
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:@ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Detects Raccoon/Racealer infostealer
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:REMCOS_RAT_variants
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_oski_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 69281664db9f7088a1cdfbf5b3468170bdbeadeb3ce9f4db3ef114ef8828e870

(this sample)

Comments