MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70c61a7220e7df5841fded5bafa8340c388440911f8c894b35872188f300f29d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 6 File information Comments

SHA256 hash: 70c61a7220e7df5841fded5bafa8340c388440911f8c894b35872188f300f29d
SHA3-384 hash: c049985deecb81c70f09525b33bc8a50c831a543678826716edb59e80b68ba369a5ca176074a662f0ff60aae6d0d4b86
SHA1 hash: b88b5ea2df88e30f6dee5ce8faf3fef04992f28b
MD5 hash: 505b07040a7c00672d73e71102906589
humanhash: north-double-eighteen-may
File name:505B07040A7C00672D73E71102906589.exe
Download: download sample
Signature RaccoonStealer
File size:4'639'232 bytes
First seen:2021-08-23 21:31:02 UTC
Last seen:2021-08-23 23:16:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:uK5Q84ZS/7EFuMRyKaqbH7QN9m82Eeyd8LCx+ZrHfYidPg904AX0dJKwkPp0Dgxt:o8
Threatray 1'856 similar samples on MalwareBazaar
TLSH T11826343CAE041A67A2A6D129E0DA0907F5F1099F23301D4A11D76F5D7E4BD433A9B3EE
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://188.119.112.104/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://188.119.112.104/ https://threatfox.abuse.ch/ioc/193472/

Intelligence


File Origin
# of uploads :
2
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
505B07040A7C00672D73E71102906589.exe
Verdict:
Malicious activity
Analysis date:
2021-08-23 21:31:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Connection attempt to an infection source
Connection attempt
Sending an HTTP POST request
Sending an HTTP GET request
Sending a UDP request
Deleting a recently created file
Reading critical registry keys
Delayed reading of the file
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Creating a file in the %AppData% subdirectories
Launching a process
Using the Windows Management Instrumentation requests
Launching a service
DNS request
Sending a custom TCP request
Creating a service
Loading a system driver
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Stealing user critical data
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Detected Stratum mining protocol
DLL side loading technique detected
Found malware configuration
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Xmrig
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Raccoon Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 470272 Sample: axbSBfbrX5.exe Startdate: 23/08/2021 Architecture: WINDOWS Score: 100 63 xmr.2miners.com 2->63 81 Sigma detected: Xmrig 2->81 83 Found malware configuration 2->83 85 Multi AV Scanner detection for submitted file 2->85 87 10 other signatures 2->87 10 axbSBfbrX5.exe 3 2->10         started        14 svchost.exe 2->14         started        16 SgrmBroker.exe 2->16         started        18 13 other processes 2->18 signatures3 process4 dnsIp5 59 C:\Users\user\AppData\...\axbSBfbrX5.exe.log, ASCII 10->59 dropped 97 Tries to delay execution (extensive OutputDebugStringW loop) 10->97 99 Injects a PE file into a foreign processes 10->99 21 axbSBfbrX5.exe 82 10->21         started        101 Changes security center settings (notifications, updates, antivirus, firewall) 14->101 26 MpCmdRun.exe 14->26         started        103 DLL side loading technique detected 16->103 65 127.0.0.1 unknown unknown 18->65 67 192.168.2.1 unknown unknown 18->67 105 Query firmware table information (likely to detect VMs) 18->105 file6 signatures7 process8 dnsIp9 69 188.119.112.104, 49711, 80 SERVERIUS-ASNL Russian Federation 21->69 71 45.90.46.71, 49712, 80 ITLDC-NLUA Russian Federation 21->71 73 telete.in 195.201.225.248, 443, 49710 HETZNER-ASDE Germany 21->73 51 C:\Users\user\AppData\...\wVsqjetoXq.exe, PE32+ 21->51 dropped 53 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 21->53 dropped 55 C:\Users\user\AppData\...\vcruntime140.dll, PE32 21->55 dropped 57 57 other files (none is malicious) 21->57 dropped 93 Tries to steal Mail credentials (via file access) 21->93 95 Tries to harvest and steal browser information (history, passwords, etc) 21->95 28 wVsqjetoXq.exe 25 8 21->28         started        33 cmd.exe 21->33         started        35 conhost.exe 26->35         started        file10 signatures11 process12 dnsIp13 77 discord.com 162.159.136.232, 443, 49719 CLOUDFLARENETUS United States 28->77 79 httpbin.org 54.159.86.231, 443, 49718 AMAZON-AESUS United States 28->79 61 C:\Users\user\AppData\...\DriversService.exe, PE32+ 28->61 dropped 107 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 28->107 109 Writes to foreign memory regions 28->109 111 Modifies the context of a thread in another process (thread injection) 28->111 113 Injects a PE file into a foreign processes 28->113 37 InstallUtil.exe 28->37         started        41 powershell.exe 28->41         started        43 conhost.exe 33->43         started        45 timeout.exe 33->45         started        file14 signatures15 process16 dnsIp17 75 xmr.2miners.com 51.89.96.41, 2222, 49721, 49731 OVHFR France 37->75 89 Query firmware table information (likely to detect VMs) 37->89 47 conhost.exe 37->47         started        49 conhost.exe 41->49         started        signatures18 91 Detected Stratum mining protocol 75->91 process19
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-08-21 23:29:42 UTC
AV detection:
17 of 46 (36.96%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:fd34ae8fb78d0554aa7caf12c271e01efb3342f6 discovery persistence spyware stealer upx
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Raccoon
Unpacked files
SH256 hash:
8cff2a432699ab3306878e0bc72ad8a5d7317d34e83a839cae64c193e05be508
MD5 hash:
26c5062919fcd2b1f2a72d88ee6a533f
SHA1 hash:
b361c378abbd4866c36e64a541a28854d94b4017
SH256 hash:
ca259eb4a02653c009d8aa7bb5ce14c8fa4f3c0ca9630c76b4934ecc3643dcd1
MD5 hash:
d6b5c4514ef5116f1a57db4da51e7d56
SHA1 hash:
2abd43574a909c439e8c1d042515632ae97d6f9d
Detections:
win_raccoon_auto
SH256 hash:
70c61a7220e7df5841fded5bafa8340c388440911f8c894b35872188f300f29d
MD5 hash:
505b07040a7c00672d73e71102906589
SHA1 hash:
b88b5ea2df88e30f6dee5ce8faf3fef04992f28b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments