MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 926359c0d236ff2b92d8c3752cfb3e1b63bc0f6cdf4ca54f995f38ba39fdb4d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 4 File information Comments

SHA256 hash: 926359c0d236ff2b92d8c3752cfb3e1b63bc0f6cdf4ca54f995f38ba39fdb4d8
SHA3-384 hash: 2aa8acf7644323e558e26d646868882f2590960c0dd0f045fa6c53f55d2afdffa13fee30a806d019de3268d00f1e6668
SHA1 hash: 36f0dee6c8de82ac3a003ff81138da8c1e25993e
MD5 hash: d71d67aefa148d4eb3ae912da83760b3
humanhash: hamper-autumn-sierra-vermont
File name:d71d67aefa148d4eb3ae912da83760b3.exe
Download: download sample
Signature RaccoonStealer
File size:1'924'832 bytes
First seen:2021-06-12 13:20:30 UTC
Last seen:2021-06-12 13:38:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 49152:oPbOuX5GeldCFZ5KFIAgO/uJX1xgtBdw+7AqCXQR1meQ:oPbOuX51fCFsglpDeBq+SXy1TQ
TLSH 369549983230B6DEC99FD4318E9D2C68AF513477871B7203D53785A9AA0C8A7DF185E3
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://34.76.8.115/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://34.76.8.115/ https://threatfox.abuse.ch/ioc/98907/

Intelligence


File Origin
# of uploads :
2
# of downloads :
351
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d71d67aefa148d4eb3ae912da83760b3.exe
Verdict:
Malicious activity
Analysis date:
2021-06-12 13:24:10 UTC
Tags:
trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
DNS request
Sending a custom TCP request
Connection attempt
Sending an HTTP POST request
Sending an HTTP GET request
Deleting a recently created file
Reading critical registry keys
Delayed reading of the file
Stealing user critical data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AntiVM3
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-09 12:48:21 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:b2e5ae6038e0c6fd3b5a3e368cbf949eca86bc07 discovery spyware stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Raccoon
Unpacked files
SH256 hash:
d53f281f92263e2ddd1bbccca499e2029afdde2e441c7c8c10a77a30624f4b73
MD5 hash:
d8df114b0a9c52c3a04a52e59a548e6b
SHA1 hash:
ec51da8524a8f401c8acd0bd198e25841d6e593f
Detections:
win_raccoon_auto
SH256 hash:
3c886556ae1753e24f39894fae4746e57b58c92ea76b97494ba0eba5d2397412
MD5 hash:
c43259a2ac79d3652a13ad7f9f906f10
SHA1 hash:
7cb378b60068eddce347009672a7836f24ff627e
SH256 hash:
5bede9eedf6ae6df5a9d587c116c9583b31474c159c2b53486b000093cb3fde6
MD5 hash:
072eeac61b35d3f09edee4ff4f80f52d
SHA1 hash:
696fd9905a47e526470c2e234fef32f1ec1b74ad
SH256 hash:
b59f2d9260287ca5bf27d90c87ef77bfe81317ad27e7860d283b55c572ff68d7
MD5 hash:
10a6d46091cc5c95e2b6f72b0c19cf70
SHA1 hash:
47541923c1ad20172cc50098e00b8166b60649f8
SH256 hash:
926359c0d236ff2b92d8c3752cfb3e1b63bc0f6cdf4ca54f995f38ba39fdb4d8
MD5 hash:
d71d67aefa148d4eb3ae912da83760b3
SHA1 hash:
36f0dee6c8de82ac3a003ff81138da8c1e25993e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_07f9d80b85ceff7ee3f58dc594fe66b6
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:INDICATOR_KB_CERT_0f9d91c6aba86f4e54cbb9ef57e68346
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments