MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8303c9a626d7edb090bdd8f0d128fc887b7fa36b0dfc43a7f71dcb5b34b1bbab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 6 File information Comments

SHA256 hash: 8303c9a626d7edb090bdd8f0d128fc887b7fa36b0dfc43a7f71dcb5b34b1bbab
SHA3-384 hash: c06be24f73ff1a884cc31fe32506e6029c98a2668a03ee648ecce4eb7a4bfa0d97d0b54ee82d8dbf2cbc7783f1ffa0d0
SHA1 hash: f7addaaf851436721919294927253726b67ce17b
MD5 hash: a75ffc6ab58574119e960ec0b1f72bfd
humanhash: fifteen-mexico-tango-violet
File name:A75FFC6AB58574119E960EC0B1F72BFD.exe
Download: download sample
Signature RaccoonStealer
File size:3'158'917 bytes
First seen:2021-09-05 01:15:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xnCvLUBsg9Xr8A8IzhdMLpxytoEKyCPwpAuYxoNl:xELUCg9r8jIzMLpxyKdXuYxoT
Threatray 494 similar samples on MalwareBazaar
TLSH T100E5331037D9C8F2D4821032CB886BB3E1FDD39C292769C77375561F5B28CD6626AB1A
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://94.158.245.173/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://94.158.245.173/ https://threatfox.abuse.ch/ioc/215894/

Intelligence


File Origin
# of uploads :
1
# of downloads :
158
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
A75FFC6AB58574119E960EC0B1F72BFD.exe
Verdict:
No threats detected
Analysis date:
2021-09-05 01:18:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Connection attempt
Sending a custom TCP request
DNS request
Running batch commands
Sending an HTTP GET request
Deleting a recently created file
Sending a UDP request
Launching a process
Result
Threat name:
SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 477816 Sample: hhXB3QLUty.exe Startdate: 05/09/2021 Architecture: WINDOWS Score: 100 105 185.177.125.94 WORLDSTREAMNL Netherlands 2->105 107 104.21.32.206 CLOUDFLARENETUS United States 2->107 109 5 other IPs or domains 2->109 131 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->131 133 Antivirus detection for URL or domain 2->133 135 Antivirus detection for dropped file 2->135 137 12 other signatures 2->137 11 hhXB3QLUty.exe 16 2->11         started        14 svchost.exe 1 2->14         started        signatures3 process4 file5 69 C:\Users\user\AppData\...\setup_install.exe, PE32 11->69 dropped 71 C:\Users\user\AppData\Local\...\libcurl.dll, PE32 11->71 dropped 73 C:\Users\user\AppData\...\Wed06c0310f7c9.exe, PE32 11->73 dropped 75 11 other files (7 malicious) 11->75 dropped 16 setup_install.exe 1 11->16         started        process6 dnsIp7 87 sornx.xyz 172.67.190.165, 49705, 80 CLOUDFLARENETUS United States 16->87 89 127.0.0.1 unknown unknown 16->89 127 Performs DNS queries to domains with low reputation 16->127 129 Adds a directory exclusion to Windows Defender 16->129 20 cmd.exe 1 16->20         started        22 cmd.exe 16->22         started        24 cmd.exe 16->24         started        26 7 other processes 16->26 signatures8 process9 signatures10 29 Wed062611295f.exe 20->29         started        32 Wed06c0310f7c9.exe 22->32         started        36 Wed0677c055f84f3.exe 24->36         started        139 Adds a directory exclusion to Windows Defender 26->139 38 Wed06bee4c0f9.exe 26->38         started        40 Wed068238a49b99.exe 1 26->40         started        42 Wed0660009604.exe 26->42         started        44 3 other processes 26->44 process11 dnsIp12 141 Multi AV Scanner detection for dropped file 29->141 143 Detected unpacking (changes PE section rights) 29->143 145 Machine Learning detection for dropped file 29->145 159 4 other signatures 29->159 46 explorer.exe 29->46 injected 91 gavenetwork.bar 32->91 99 4 other IPs or domains 32->99 57 C:\Users\user\AppData\Roaming\4596964.exe, PE32 32->57 dropped 59 C:\Users\user\AppData\Roaming\3844797.exe, PE32 32->59 dropped 61 C:\Users\user\AppData\Roaming\8111147.exe, PE32 32->61 dropped 67 2 other files (none is malicious) 32->67 dropped 147 Performs DNS queries to domains with low reputation 32->147 93 162.159.134.233, 443, 49719 CLOUDFLARENETUS United States 36->93 63 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 36->63 dropped 149 Antivirus detection for dropped file 36->149 151 Creates processes via WMI 36->151 95 91.240.85.160, 49710, 49722, 80 THEFIRST-ASRU Russian Federation 38->95 101 3 other IPs or domains 38->101 153 May check the online IP address of the machine 38->153 155 Tries to harvest and steal browser information (history, passwords, etc) 38->155 157 Disable Windows Defender real time protection (registry) 38->157 103 3 other IPs or domains 40->103 65 C:\Users\user\AppData\...\Wed0660009604.tmp, PE32 42->65 dropped 51 Wed0660009604.tmp 42->51         started        97 74.114.154.18 AUTOMATTICUS Canada 44->97 53 Wed069ea7b9fa22d66d.exe 44->53         started        file13 signatures14 process15 dnsIp16 111 185.255.120.26 SVEASE Netherlands 46->111 113 177.133.55.99 TELEFONICABRASILSABR Brazil 46->113 115 31.167.180.141 MOBILY-ASEtihadEtisalatCompanyMobilySA Saudi Arabia 46->115 77 C:\Users\user\AppData\Roaming\suhujgh, PE32 46->77 dropped 123 System process connects to network (likely due to code injection or exploit) 46->123 125 Hides that the sample has been downloaded from the Internet (zone.identifier) 46->125 117 the-flash-man.com 51->117 119 best-link-app.com 51->119 79 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 51->79 dropped 81 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 51->81 dropped 83 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 51->83 dropped 121 a.goatgame.co 172.67.146.70, 443, 49708 CLOUDFLARENETUS United States 53->121 85 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 53->85 dropped 55 conhost.exe 53->55         started        file17 signatures18 process19
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-09-01 09:35:27 UTC
AV detection:
22 of 39 (56.41%)
Threat level:
  5/5
Result
Malware family:
vkeylogger
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar family:vkeylogger botnet:706 aspackv2 backdoor infostealer keylogger stealer themida trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
VKeylogger
VKeylogger Payload
Vidar
Malware Config
C2 Extraction:
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
https://lenko349.tumblr.com/
Dropper Extraction:
http://shellloader.com/welcome
Unpacked files
SH256 hash:
73275c45c0cf079dae8705b75a706205a9eba2837957d1e7b67008929e7517b6
MD5 hash:
e1024f6828953de98e9c19caeffe7b42
SHA1 hash:
bcb77523d815c96dab29b0e387ccb08835026767
SH256 hash:
1e47b0a87b714febf0f805a2c319a150cc8bd58d738669c76c975a64d40130ab
MD5 hash:
6cbca955ae2bb778cf9de6cef5d114a7
SHA1 hash:
527feb36a0cbd2c348df1862bb2d4516ed9bad6f
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
73f4dae950ffb81e1639629fde9cdcd372496f27e07a2efffa3063288bd9597d
MD5 hash:
a07c333eea0c9bed3c4cda258e7217b5
SHA1 hash:
a7f02c6bb2f0bab93decc86e58b3502e3bd45217
SH256 hash:
0e4860b4d648c1b797178252ed1470db67dabc4ab77d35f704decdaf03823f48
MD5 hash:
3974ad6e78311194b5ecef34bd80bb49
SHA1 hash:
a3ec802074092afa6a233dcb7a027fbe53e3a183
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
2c25be1b33d7ca3cb5111575b7e38af9b004c5472a6bbff3b58257d9e9789a51
MD5 hash:
36a63a0cb330d5c267f86c017f53ae8c
SHA1 hash:
318a7d00be84cc62b1f191bb7ce30c4e88be356d
SH256 hash:
8fbba2964fc691ecb1355b8ff2c5c1712c4f8d937550d132a69f55f3c726d417
MD5 hash:
19f0bd0511600055d123269dd9185bbe
SHA1 hash:
27bf4df55f89b26b026ccd8212c8aa5e8c057cae
SH256 hash:
8fdfaa3e5cda057c8736c72c5e124f37801e7bf2f25c0c8d37f8351cc42224e5
MD5 hash:
369bff77587fc199940a3ad5050398b1
SHA1 hash:
21a75c9856c57d71d0435e72b6439d935aeb695d
SH256 hash:
60bc5b74b4cfbbe71736aef4ff5a5460911fb80f4b15ee2427a8eb4ff6f97401
MD5 hash:
20980f33b35db665353104cfd321cdf8
SHA1 hash:
1aeeb56683c6acf2527446b35e37100d49c888f8
SH256 hash:
a783269f7f7a53304d672c09bb993168d824f0c4fc6b98a7bec1913ef8812290
MD5 hash:
bbf5987e16bec2dad97252d2fc67d375
SHA1 hash:
13b7773aae7778d74dd4f7b7e2dccbaaf8a44210
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
bcb39f7cf009ff86e79fa71681e8231d347716a5f3c7bc10a4377bcf45b47df2
MD5 hash:
a3eeec877799405077fdaa433c84f252
SHA1 hash:
e2f3668ebf929f42b220089b3ce67bc5b460c091
SH256 hash:
a66be2db03e98e6e42da47b134d4e524f44bc3b32ffeca31f1f600ec2a629eaa
MD5 hash:
dee86bc0556b9458669a825e510df784
SHA1 hash:
8e67ff85f7d68465eb440db76f3bdf94e629ba91
SH256 hash:
31d39820ec657a12beb4f8f77533d29a38569d1a683ad7fddfd63fd14f4f16e5
MD5 hash:
a24abcc2717a203be7e7f50acc83430e
SHA1 hash:
8f4fedb27e16fda650ef72c239e452a6f477c56d
SH256 hash:
53a45ce5392b36ee7c7a7730da6ede26d98c8ab7c9c7f3072f562df06ad345f3
MD5 hash:
7701a671ca59de4b545663a7a7cef873
SHA1 hash:
2052d1a5b9abd2833cf66917dd9d0e5e61d86c3b
SH256 hash:
8303c9a626d7edb090bdd8f0d128fc887b7fa36b0dfc43a7f71dcb5b34b1bbab
MD5 hash:
a75ffc6ab58574119e960ec0b1f72bfd
SHA1 hash:
f7addaaf851436721919294927253726b67ce17b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments