MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 726b323eb5c1c2ae7928f60d7002b3b63b4a69158347686d17789eb0e86fd768. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | 726b323eb5c1c2ae7928f60d7002b3b63b4a69158347686d17789eb0e86fd768 |
|---|---|
| SHA3-384 hash: | 902ed293c661566bf6357434cb7d0164a13b364ba97836ce772d4953c63cbe1cf6db29d48e4ff85cddc5d03edcd4ac59 |
| SHA1 hash: | a73378dca88646123202d3e9cb83f74df3d56b31 |
| MD5 hash: | dabc2121c0e66e7547e6d7d69b5eba95 |
| humanhash: | august-texas-social-lima |
| File name: | dabc2121c0e66e7547e6d7d69b5eba95.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 497'152 bytes |
| First seen: | 2021-09-21 15:30:44 UTC |
| Last seen: | 2021-09-21 16:17:10 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b4a5f131bf57e0871ab3cda52113b279 (4 x RedLineStealer, 2 x RaccoonStealer, 2 x Stop) |
| ssdeep | 12288:d5nAy0Y/ldBcVGy4BneLBw2B60kjLeYcHyJjA8iXTBai:fAJYt0Vb4BnWS2B60bYcHyJ08iXTh |
| Threatray | 3'173 similar samples on MalwareBazaar |
| TLSH | T14CB4021035A0C672C78F96704B64D6A05B7AB9262A7097573A37337FFF24290732B35A |
| File icon (PE): | |
| dhash icon | b27a7c7d727e6e76 (9 x RaccoonStealer, 1 x RedLineStealer, 1 x AZORult) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://45.95.11.122/ | https://threatfox.abuse.ch/ioc/224422/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.