MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9f9db94621c74bf0f8e8d8a4fc2b1319e11f3d87cb90ba8b20c2945a53a6b874. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 13
| SHA256 hash: | 9f9db94621c74bf0f8e8d8a4fc2b1319e11f3d87cb90ba8b20c2945a53a6b874 |
|---|---|
| SHA3-384 hash: | 805faf63e3be3f0407d08a93faa74aa6d9fcf16684fd145809d012f6c1f878966c667970a6bda30074aa7afef122818b |
| SHA1 hash: | 4727b6fee7596f04323a9c098487bad12122bc7d |
| MD5 hash: | 8282727e654167ce5b0cef69d3c91656 |
| humanhash: | nuts-pluto-cup-beryllium |
| File name: | 8282727E654167CE5B0CEF69D3C91656.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 554'496 bytes |
| First seen: | 2021-07-30 21:15:37 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b84deb9b8714a4601d7e89810ca8b439 (1 x RaccoonStealer) |
| ssdeep | 12288:y0WGadTM/Y1m9+HtJnK7OwpucRLg4tFQedcG:yRzGgM9+NJnKjLLx7QIcG |
| Threatray | 1'338 similar samples on MalwareBazaar |
| TLSH | T1AFC4F10073D0C232E45654368629C3B15E7BB4761B76A9CFBFC40AB91F2A6D1B73670A |
| dhash icon | cc86f0c5c4ccf2d6 (1 x RaccoonStealer) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://185.234.247.148/ | https://threatfox.abuse.ch/ioc/164913/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
576
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8282727E654167CE5B0CEF69D3C91656.exe
Verdict:
Malicious activity
Analysis date:
2021-07-30 21:16:12 UTC
Tags:
trojan stealer raccoon
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Raccoon
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Detection:
raccoon
Threat name:
Win32.Trojan.Raccoon
Status:
Malicious
First seen:
2021-07-27 10:43:03 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 1'328 additional samples on MalwareBazaar
Result
Malware family:
raccoon
Score:
10/10
Tags:
family:raccoon botnet:afefd33a49c7cbd55d417545269920f24c85aa37 stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Raccoon
Raccoon Stealer Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
0a00415f8e43a51ceccaa6599bdb216148fe0cbc895b2acfa137e819cda36681
MD5 hash:
48ff9d7470c13b9de99968bd76f5db1e
SHA1 hash:
5cbe772066d7c7f0b512f58267c1250907b0849e
Detections:
win_raccoon_auto
Parent samples :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 hash:
9f9db94621c74bf0f8e8d8a4fc2b1319e11f3d87cb90ba8b20c2945a53a6b874
MD5 hash:
8282727e654167ce5b0cef69d3c91656
SHA1 hash:
4727b6fee7596f04323a9c098487bad12122bc7d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.