MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9ecb3553a9b19155cb2022f5620153581a2b370655f66a53caf44cd920330471. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 9ecb3553a9b19155cb2022f5620153581a2b370655f66a53caf44cd920330471
SHA3-384 hash: f4e7f454120a873408b2e1777d9c5e75bb86c65e82f2c8e7f7ca57bee4fa4e743d5cc1ed6df22034731da97cf5071e70
SHA1 hash: 5d3046875b1d0d7025b75c33b66e5281841026db
MD5 hash: bf344b913dfaaef03e03744cc3fa95c8
humanhash: violet-glucose-nevada-sodium
File name:bf344b913dfaaef03e03744cc3fa95c8.exe
Download: download sample
Signature Arechclient2
File size:18'479'824 bytes
First seen:2023-01-17 16:30:36 UTC
Last seen:2023-01-17 18:37:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e569e6f445d32ba23766ad67d1e3787f (259 x Adware.Generic, 41 x RecordBreaker, 24 x RedLineStealer)
ssdeep 393216:Q6oTDxOonQ23NhXydEcfKXKWMgoYwbl1a6SuXXrouVNOXGA:folnQ23/XjaKdMWwby69ouHqGA
TLSH T1F81723BB737865FEF75A0B314536B3A1A977EE516D1E481A3BE0040CCF568A01E3A6D0
TrID 61.8% (.EXE) Inno Setup installer (109740/4/30)
23.4% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
5.9% (.EXE) Win64 Executable (generic) (10523/12/4)
2.5% (.EXE) Win32 Executable (generic) (4505/5/1)
1.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon f08e2a6929a98ef0 (1 x Arechclient2)
Reporter abuse_ch
Tags:Arechclient2 exe signed

Code Signing Certificate

Organisation:Balistreri.com
Issuer:Balistreri.com
Algorithm:sha256WithRSAEncryption
Valid from:2023-01-08T21:10:52Z
Valid to:2024-01-08T21:30:52Z
Serial number: 6149e65da4e8428e4b573343e8b0aa43
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 081861cb19ae540d751bf9c1435de88f59ec0802e9d29ef54f7dcb755d067f64
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
Arechclient2 C2:
http://5.78.53.188/

Intelligence


File Origin
# of uploads :
2
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bf344b913dfaaef03e03744cc3fa95c8.exe
Verdict:
Malicious activity
Analysis date:
2023-01-17 16:33:39 UTC
Tags:
installer trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Sending a custom TCP request
Moving a file to the %temp% subdirectory
Creating a file
Moving a recently created file
Running batch commands
Creating a process with a hidden window
Enabling the 'hidden' option for files in the %temp% directory
Launching a process
Using the Windows Management Instrumentation requests
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckNumberOfProcessor
CheckCmdLine
Verdict:
No Threat
Threat level:
  2/10
Confidence:
80%
Tags:
overlay packed setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Result
Threat name:
Raccoon Stealer v2
Detection:
malicious
Classification:
troj.spyw.evad
Score:
58 / 100
Signature
Encrypted powershell cmdline option found
Hides threads from debuggers
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has a writeable .text section
PE file has nameless sections
Queries disk data (e.g. SMART data)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Suspicious powershell command line found
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Very long command line found
Yara detected Raccoon Stealer v2
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 786002 Sample: 3BPp5OFB7v.exe Startdate: 17/01/2023 Architecture: WINDOWS Score: 58 67 Multi AV Scanner detection for dropped file 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 Yara detected Raccoon Stealer v2 2->71 73 6 other signatures 2->73 10 3BPp5OFB7v.exe 2 2->10         started        process3 file4 51 C:\Users\user\AppData\...\3BPp5OFB7v.tmp, PE32 10->51 dropped 89 Obfuscated command line found 10->89 14 3BPp5OFB7v.tmp 5 18 10->14         started        signatures5 process6 file7 53 C:\Users\user\AppData\Local\...\is-0QH5I.tmp, PE32 14->53 dropped 55 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 14->55 dropped 57 C:\...\Smart.Defrag.8.2.0.197.exe (copy), PE32 14->57 dropped 59 3 other files (2 malicious) 14->59 dropped 17 Smart.Defrag.8.2.0.197.exe 2 14->17         started        21 cmd.exe 1 14->21         started        process8 file9 39 C:\Users\user\...\Smart.Defrag.8.2.0.197.tmp, PE32 17->39 dropped 75 Obfuscated command line found 17->75 23 Smart.Defrag.8.2.0.197.tmp 28 163 17->23         started        77 Suspicious powershell command line found 21->77 79 Very long command line found 21->79 81 Encrypted powershell cmdline option found 21->81 26 powershell.exe 21 21->26         started        28 conhost.exe 21->28         started        30 powershell.exe 21->30         started        signatures10 process11 file12 43 C:\Users\user\AppData\...\iswin7logo.dll, PE32 23->43 dropped 45 C:\Users\user\AppData\Local\...\botva2.dll, PE32 23->45 dropped 47 C:\Users\user\AppData\Local\Temp\...\b2p.dll, PE32 23->47 dropped 49 114 other files (38 malicious) 23->49 dropped 32 SmartDefrag.exe 1 33 23->32         started        process13 dnsIp14 61 cs833182181.wpc.etacdn.net 152.199.20.140, 49693, 49694, 49695 EDGECASTUS United States 32->61 63 192.168.2.1 unknown unknown 32->63 65 2 other IPs or domains 32->65 41 C:\Windows\...\IObitSmartDefragExtension.dll, PE32+ 32->41 dropped 83 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 32->83 85 Queries disk data (e.g. SMART data) 32->85 87 Hides threads from debuggers 32->87 37 regsvr32.exe 32->37         started        file15 signatures16 process17
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-01-09 03:05:21 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
11 of 26 (42.31%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Raccoon
Malware Config
Dropper Extraction:
http://135.181.123.26/sccp32.dll
http://135.181.123.26/rundll32.bat
Unpacked files
SH256 hash:
27347ea90e301ffd9ea20324ac6d8f2f012da3d9b0c3f6fc7604caf9b63ded38
MD5 hash:
90932c77b104f5b12b9579e1449c9069
SHA1 hash:
eaa4daa2b64e0a79c9a0af878a65139edc6e18c9
SH256 hash:
cc11bfffd1684ad100f902e696bd9664cf6f57b268664c8d4d0210fed98b6085
MD5 hash:
048568ba8202ef0a45658ebb533e1d64
SHA1 hash:
e7d6d01b6d9d40eab89737bd52711a720c8579c6
SH256 hash:
dfe25e9c801f828df9fb5e3baee41651ba72c1e00634be4b648d72f1ad8599e7
MD5 hash:
559ec2666c1b2a509aebf1cfd182add8
SHA1 hash:
d9fe1a0fc77eee967de02606f87c5a8c5c6d7729
SH256 hash:
40178928a2c9f57691bcedbcbd4f8fe4e28e1b64d0190189e5e59efca1add0e8
MD5 hash:
21a92b0b64bb18621227fa3f109bebef
SHA1 hash:
d70ba195d077454715dc06c1996c40827ea4be07
SH256 hash:
6f0aed82f71925ad0aa317c16be0eb1e0493536aa7797f0a8052de0ad25af0c3
MD5 hash:
b1dc982dc62aaa54f93da63de2ecf1de
SHA1 hash:
d2a70065c74a1d303bfee07252ee4723a1030285
SH256 hash:
84c7c5af2a5d18cd4d4d68120f24d08e842be1da4881180c29558c5526d51e15
MD5 hash:
0531a47aab6835177a025d5c6ee14b69
SHA1 hash:
cb5893dc2c03654d99ef570e9d515841a1f21018
SH256 hash:
6cb9aa7bad91a8941d40e58ddb62dd6e648c4e55caed1f019c1005726728aec5
MD5 hash:
34a3a07d809b97142f6e28861bb628ea
SHA1 hash:
c53c339a06680c045dff7d0ea572900e84772bf0
SH256 hash:
12d9cf855f2428e5f53ccc0a6afa7416727ae56b81a337d5e6184fd9f90a53d2
MD5 hash:
e6ec00c73e01cbbd80502947de41eeaa
SHA1 hash:
c46470887deabbf95e5e241353cea86729a5f8a5
SH256 hash:
55a7b6e88f03528c8cdcc4cfff9a7e5efce3c9d3d21023ef2b37aa228b530ddc
MD5 hash:
850d12295447dbcd9e38a073aef72fb6
SHA1 hash:
bb8e998ed8b2e07d5ffec82509019df134468643
SH256 hash:
2087649ae1e07787da00055ef51a03cf61dd0ab21fc41c451422fb03c394f966
MD5 hash:
9b3ae44d17da048e0077d717cab9f5d7
SHA1 hash:
ab31a4f445d087b2b74357c300d0e557457d2770
SH256 hash:
20e0bf5f0b4797922a1cbee128ddd19398d48695514bb4ce8fdda7ee563bf880
MD5 hash:
b29b234e7e78272eb4e5cb085b014fa9
SHA1 hash:
89f40d15867022a723c3f41a8a530d16becc8668
SH256 hash:
b49fc8c018d1a7f017fc1ee5ce77e62b84cce313a866238b83f3069fc7d745f2
MD5 hash:
511ade506cfd7eaf50439999651d67d2
SHA1 hash:
785f28a372d9d2d6dca3470e2dbcaf62c124ab2d
SH256 hash:
ebb73aa5a6bb1bb197016e605f31927cac888b90854d7d979ad44f85b02b5d2c
MD5 hash:
9615d9a60bb09157f97882c1c55e748c
SHA1 hash:
6e19c1e1cc9f3c6a2f3fd8dab321d90bf2b2c964
SH256 hash:
36a1dc2c68b74e66810fa0ddc939cddbb9ae4e2581c92a1f251413e3ed33cb8d
MD5 hash:
f2d20f59fddd432abff5c7c49239046b
SHA1 hash:
683717965747f23e86e9a753f63ae2acd8173458
SH256 hash:
c79ef3c66fd7b4071e4de69bc01faa0e224a79302e8d7bd6c58c68a526de8647
MD5 hash:
1b9477539f3468528cb92839a8f1148b
SHA1 hash:
66d0d00cc575fbe4363ce2c7f2774c2a2a74718e
SH256 hash:
8afecf226f33e75f5584f1bb80b34aaaa91c1c2c68629de84bc8f6138c238e53
MD5 hash:
9e1ab294777b7c16cde0e2face0c56ba
SHA1 hash:
637691c41bfc4d0f69a0e49322ffd56febd4953f
SH256 hash:
e60d85e3225aad5397513fb3a1247da025c0602e233587c1193258dae92ead68
MD5 hash:
b41745d1c49c1b5327ad465151649793
SHA1 hash:
56035a9c146858082bb52aeb20d44e7e55dc18d1
SH256 hash:
921f3f20c5b57207eaabf0ac36c14a9a790f298c609d5f83b971d93db001770e
MD5 hash:
0bbcbb53588ec43a8d2927fec49db72f
SHA1 hash:
4bb4066342c212d702abc948c027202c3ef49ff1
SH256 hash:
c3cb1250e209dcb2933dfd9b0afc1f9becf891380d74030af4a4d1d844d95ad0
MD5 hash:
6a483dd57e5b00a43600b21ff7b2ec55
SHA1 hash:
497d096a03999f013a31aadbd3e72d8b3c5c0d95
SH256 hash:
d07f65559d896e6efe610a76fd23f8047949a7af9d8b263557536b56e57f848f
MD5 hash:
ac371144e3c01128b18c7490ad4e6f1b
SHA1 hash:
41e3d588e8c4fbd01176a1cbd90070cb8c7e9b45
SH256 hash:
cd54a92d40b6dc1c08a66a42adaa5ec17d2b9af26b7e1f3f53b7b727a3550955
MD5 hash:
f31082f793743d79282dd2909d261646
SHA1 hash:
2ccc606752dafb5901f1bc338f60f345284fa286
SH256 hash:
f334e8bc3981543d9e59f84afaf344d304312db941f8e795da8c69efcec36223
MD5 hash:
ff5d99ddeb6f990a2f237318455d3e20
SHA1 hash:
27d8439e9e7aa93553a8f15e4861ac46b9b23bea
SH256 hash:
d50e7554a15a85d611418b63c12eef3100cfc3f5243cd6f31f81399855852144
MD5 hash:
8bf7a66d7fa88d166497bc904cf39127
SHA1 hash:
03d75538dd7ac6a26a1dee62c93970e8e9ea10f4
SH256 hash:
e69f663e13fe1e13498ad2f980208c37a764e2fef89ce3f0ce2196d3478d4b5d
MD5 hash:
24a224c96c7c0f2ce795f2da10931da5
SHA1 hash:
4b95bcb8c08f5b92622d410a641e04d81c532f56
SH256 hash:
a04c142a248693cdb4eaebb86fe8d5289f91828f3369c5e066fa086c49c34e27
MD5 hash:
2eafa7602aa7de81c3f68297503a4c4a
SHA1 hash:
ee7882cbf83e80886d03bc500d064e9b1f465b71
SH256 hash:
488937779fb36bda66a1a7418b7afd15f21dec26067beb5aff7854e12f004c11
MD5 hash:
00de4c66cdc80302255f30e2f6a0e7fb
SHA1 hash:
887cfb131c13715bf489b749bd58d749c751523b
SH256 hash:
9ecb3553a9b19155cb2022f5620153581a2b370655f66a53caf44cd920330471
MD5 hash:
bf344b913dfaaef03e03744cc3fa95c8
SHA1 hash:
5d3046875b1d0d7025b75c33b66e5281841026db
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments