MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7052ad910ee7b7f7b15c86e59fc9b09d83b6501bf929b737a2c0b8b1d7d04d5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments 1

SHA256 hash: 7052ad910ee7b7f7b15c86e59fc9b09d83b6501bf929b737a2c0b8b1d7d04d5c
SHA3-384 hash: d6fb7573b0cd3f5642c2a869b5d1c70438493c51649343960c427e03815eebfb189ecc94fd1b0f392ecf917184b9d188
SHA1 hash: ba795084b2b4b46b9f66fddc1fd908cc87fd852b
MD5 hash: 23fed1c9856f4e0565d76ba346197dbc
humanhash: quiet-william-cup-louisiana
File name:7052ad910ee7b7f7b15c86e59fc9b09d83b6501bf929b.exe
Download: download sample
Signature RaccoonStealer
File size:555'008 bytes
First seen:2021-05-08 21:25:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 48e796cf546b09988f5fd57d931d6e76 (1 x RaccoonStealer)
ssdeep 12288:LzvE1UPQNHSqUORyI2hY7GSAmkdckNBpuIn2S:LbFINHSORpaYiIackNB4g2S
Threatray 594 similar samples on MalwareBazaar
TLSH 4FC4CF10EFB1D034F5B26AF44A7992D8693A7E726B3488CF12C212DA5A346F49C71377
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://34.89.59.109/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://34.89.59.109/ https://threatfox.abuse.ch/ioc/33419/

Intelligence


File Origin
# of uploads :
1
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a UDP request
Connection attempt
Sending an HTTP POST request
Sending a TCP request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-02-22 21:04:13 UTC
AV detection:
38 of 47 (80.85%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:a3a85b69314053c3bb015532d1a960a3d08baeb8 stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
67f351a64c9620363026657b7d526a1d8ba9f3de994b5c41bb3302c267045bbb
MD5 hash:
db0cb8be1680a2386fa3619afceb6a0c
SHA1 hash:
5a419a2a3e3522a2e498043bf0aae5acc6367859
Detections:
win_raccoon_auto
SH256 hash:
7052ad910ee7b7f7b15c86e59fc9b09d83b6501bf929b737a2c0b8b1d7d04d5c
MD5 hash:
23fed1c9856f4e0565d76ba346197dbc
SHA1 hash:
ba795084b2b4b46b9f66fddc1fd908cc87fd852b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-08 22:00:16 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
1) [B0012.001] Anti-Static Analysis::Argument Obfuscation
2) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
3) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
4) [C0046] File System Micro-objective::Create Directory
5) [C0049] File System Micro-objective::Get File Attributes
6) [C0052] File System Micro-objective::Writes File
7) [C0033] Operating System Micro-objective::Console
8) [C0040] Process Micro-objective::Allocate Thread Local Storage
9) [C0041] Process Micro-objective::Set Thread Local Storage Value
10) [C0018] Process Micro-objective::Terminate Process