MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8a323a769306f2473a63de314724e0953087224919e723b88adcc94ff7a9e3a6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 6 File information Comments

SHA256 hash: 8a323a769306f2473a63de314724e0953087224919e723b88adcc94ff7a9e3a6
SHA3-384 hash: 3dd2bb5207d92ad8d96f74b17a5b9ceb5bdad2eb93e4b842f74355e889123763580940ce35a545decbad8d7a0c0be8fc
SHA1 hash: 08769c6a627e2b7562e8226de7f0caf4cbf4b454
MD5 hash: da82741efad64eea568ae23f173cfbd7
humanhash: steak-nuts-river-snake
File name:da82741efad64eea568ae23f173cfbd7.exe
Download: download sample
Signature RaccoonStealer
File size:2'549'984 bytes
First seen:2021-02-23 18:46:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4328f7206db519cd4e82283211d98e83 (533 x RedLineStealer, 18 x Arechclient2, 15 x DCRat)
ssdeep 49152:Un8VFxG5HimidTRVCpRtkbvkTBwgCJdTb2LYrD6dPyZuuqb88dZH/+GN:3cimirCpovk1CJdPGcutbx9+GN
Threatray 1'418 similar samples on MalwareBazaar
TLSH C6C53338FBB30D21CA9B1DB14775C74F70B0A75825D406DF30E654148B5AA634EA7ABC
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
DNS request
Sending a custom TCP request
Creating a file
Creating a process from a recently created file
Sending a UDP request
Creating a window
Deleting a recently created file
Reading critical registry keys
Delayed reading of the file
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process with a hidden window
Running batch commands
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Launching a process
Using the Windows Management Instrumentation requests
Replacing files
Sending a TCP request to an infection source
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Binary contains a suspicious time stamp
Connects to a pastebin service (likely for C&C)
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Found malware configuration
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Xmrig
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Raccoon Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 356970 Sample: Fs7U7nti7y.exe Startdate: 23/02/2021 Architecture: WINDOWS Score: 100 80 yearofthepig.top 2->80 82 iplogger.org 2->82 118 Sigma detected: Xmrig 2->118 120 Found malware configuration 2->120 122 Antivirus / Scanner detection for submitted sample 2->122 124 10 other signatures 2->124 11 Fs7U7nti7y.exe 15 5 2->11         started        16 RantimeBroker.exe 2->16         started        signatures3 process4 dnsIp5 96 iplogger.org 88.99.66.31, 443, 49737, 49778 HETZNER-ASDE Germany 11->96 98 blog.agencia10x.com 104.21.67.51, 443, 49738 CLOUDFLARENETUS United States 11->98 100 pastebin.com 104.23.98.190, 443, 49736 CLOUDFLARENETUS United States 11->100 76 C:\Users\user\AppData\Local\22222.exe, PE32 11->76 dropped 78 C:\Users\user\AppData\Local\1111.exe, PE32 11->78 dropped 134 Detected unpacking (changes PE section rights) 11->134 136 Query firmware table information (likely to detect VMs) 11->136 138 Hides threads from debuggers 11->138 18 1111.exe 14 3 11->18         started        21 22222.exe 14 3 11->21         started        140 Tries to detect sandboxes and other dynamic analysis tools (window names) 16->140 142 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->142 file6 signatures7 process8 dnsIp9 114 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->114 116 Injects a PE file into a foreign processes 18->116 24 1111.exe 84 18->24         started        84 192.168.2.1 unknown unknown 21->84 29 22222.exe 21->29         started        signatures10 process11 dnsIp12 90 tttttt.me 95.216.186.40, 443, 49752, 49776 HETZNER-ASDE Germany 24->90 92 yearofthepig.top 104.21.50.15, 443, 49753, 49777 CLOUDFLARENETUS United States 24->92 94 178.20.44.153, 49762, 80 ASN-FRWInternetServiceProviderIT Russian Federation 24->94 60 C:\Users\user\AppData\...\PppwI9VgQo.exe, PE32 24->60 dropped 62 C:\Users\user\AppData\...\nssckbi.dll, PE32 24->62 dropped 64 C:\Users\user\AppData\LocalLow\...\nss3.dll, PE32 24->64 dropped 72 37 other files (none is malicious) 24->72 dropped 130 Tries to steal Mail credentials (via file access) 24->130 31 PppwI9VgQo.exe 24->31         started        36 cmd.exe 24->36         started        66 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 29->66 dropped 68 C:\Users\user\AppData\...\vcruntime140.dll, PE32 29->68 dropped 70 C:\Users\user\AppData\...\ucrtbase.dll, PE32 29->70 dropped 74 17 other files (none is malicious) 29->74 dropped 132 Tries to harvest and steal browser information (history, passwords, etc) 29->132 file13 signatures14 process15 dnsIp16 102 195.2.84.91, 49770, 80 ZENON-ASMoscowRussiaRU Russian Federation 31->102 104 iplogger.org 31->104 52 C:\Users\user\AppData\...\RantimeBroker.exe, PE32 31->52 dropped 54 C:\Users\user\AppData\Roaming\...\cpu.exe, PE32+ 31->54 dropped 56 C:\Users\user\AppData\...\WinRing0x64.sys, PE32+ 31->56 dropped 58 C:\Users\user\AppData\Roaming\...\config.json, ASCII 31->58 dropped 106 Detected unpacking (changes PE section rights) 31->106 108 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->108 110 Query firmware table information (likely to detect VMs) 31->110 112 3 other signatures 31->112 38 cpu.exe 31->38         started        42 schtasks.exe 31->42         started        44 conhost.exe 36->44         started        46 timeout.exe 36->46         started        file17 signatures18 process19 dnsIp20 86 51.68.21.186, 4444, 49779 OVHFR France 38->86 88 pool.minexmr.com 38->88 126 Query firmware table information (likely to detect VMs) 38->126 48 conhost.exe 38->48         started        50 conhost.exe 42->50         started        signatures21 128 Detected Stratum mining protocol 86->128 process22
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2021-02-23 17:13:54 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:xmrig botnet:99fdcb30af520f176f0e14e858c8bb23c13330d9 botnet:aef61793e586ca15c24106ac17a2a83a30fb0a25 discovery evasion infostealer miner spyware stealer themida trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Drops startup file
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
themida
Executes dropped EXE
Detected Stratum cryptominer command
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner Payload
Raccoon
RedLine
RedLine Payload
xmrig
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
08d788d75d8bc448a1140a6c9f096f7fe4e369d5c3c8ded095a34fdac8ccb15f
MD5 hash:
b3b5835d90b6465889d0d8b1b3fef6ab
SHA1 hash:
d4815cd839cffd35d48e42ef0caa4122f5a6268e
SH256 hash:
8a323a769306f2473a63de314724e0953087224919e723b88adcc94ff7a9e3a6
MD5 hash:
da82741efad64eea568ae23f173cfbd7
SHA1 hash:
08769c6a627e2b7562e8226de7f0caf4cbf4b454
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:INDICATOR_KB_CERT_07f9d80b85ceff7ee3f58dc594fe66b6
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:INDICATOR_KB_CERT_0f9d91c6aba86f4e54cbb9ef57e68346
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a paste
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe 8a323a769306f2473a63de314724e0953087224919e723b88adcc94ff7a9e3a6

(this sample)

  
Delivery method
Distributed via web download

Comments