MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a048547702aaf89637813c4cdc925cf25ab7a3710bfc95f21046be931c1cae63. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 13
| SHA256 hash: | a048547702aaf89637813c4cdc925cf25ab7a3710bfc95f21046be931c1cae63 |
|---|---|
| SHA3-384 hash: | b39a2184423997df4f5aee05247ee0ab9d947fe65d12d3b5c98b48d63b7a193a11233408ca95abbbb50c336d3af0d7b7 |
| SHA1 hash: | 7e828cc8ef5d5bc0ec14b40850c999d92b730995 |
| MD5 hash: | 0b51a56e6b3393ff04e6cc6fced4e068 |
| humanhash: | august-chicken-pip-queen |
| File name: | 0b51a56e6b3393ff04e6cc6fced4e068.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 17'120'948 bytes |
| First seen: | 2021-12-09 19:21:46 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer) |
| ssdeep | 393216:xqdgEs7bbKSU4k92BaH34ucNtOh2xDMOHdGHguuyaU/RMYWTFNt3C9:wdgEeiSUp920c/OaxruuXUaTFLC9 |
| Threatray | 804 similar samples on MalwareBazaar |
| TLSH | T1C0073366BE94C0BFDE45993AB2D8F7C2417BA2890D13DCE34704A3EC967D141F12DAA1 |
| File icon (PE): | |
| dhash icon | 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://194.180.174.97/ | https://threatfox.abuse.ch/ioc/271545/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0b51a56e6b3393ff04e6cc6fced4e068.exe
Verdict:
No threats detected
Analysis date:
2021-12-09 19:28:01 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
Creating a file
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
barys mimikatz mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Amadey Raccoon RedLine SmokeLoader Socel
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Found strings related to Crypto-Mining
Found Tor onion address
Hides threads from debuggers
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Execution Of Other File Type Than .exe
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara detected Xmrig cryptocurrency miner
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Hacktool.NirSoftPT
Status:
Malicious
First seen:
2021-12-06 01:38:44 UTC
File Type:
PE (Exe)
Extracted files:
213
AV detection:
27 of 44 (61.36%)
Threat level:
1/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 794 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:amadey family:loaderbot family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:03.12_build_3 botnet:915 botnet:e01406cf9a804c70b4a66c9ff45ad42151469416 aspackv2 backdoor discovery evasion infostealer loader miner persistence stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Drops startup file
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
LoaderBot executable
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Amadey
LoaderBot
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
185.215.113.35/d2VxjasuwS/index.php
http://www.wgqpw.com/
45.9.20.221:15590
https://qoto.org/@mniami
https://noc.social/@menaomi
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
185.215.113.35/d2VxjasuwS/index.php
http://www.wgqpw.com/
45.9.20.221:15590
https://qoto.org/@mniami
https://noc.social/@menaomi
Unpacked files
SH256 hash:
db51913dcbd74a51e46f4d8dca34ddaf44a928fd5250b34858b9d165dd68eca4
MD5 hash:
74f0d39f05f13a059791497a61471842
SHA1 hash:
f5c39e3b0429cba32f009b191d12b590378aa51e
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
c3b49b025fa735d4e4519b4f46a5b72e6660a7a1929e5cc3a5ca9d76ea0bc3af
MD5 hash:
6566606c354d37a6450af04b97efaf0a
SHA1 hash:
9b0e443b8f91e8bf4672de012a829050b39f17f6
SH256 hash:
6935a0cfb45e94ddece46fa1408e7c30915e31a75e39b452f1b82d0312d6ea35
MD5 hash:
d5521c4732811d273d8afc3bf5dc103e
SHA1 hash:
1dd7defe73b8e70aa1d57caaf78368d3aa2693fa
SH256 hash:
d1c351cb812296eb57229d7457642a58245e17f5f80bdc1731c31e245ed23558
MD5 hash:
071f0adc2721cfd1472868a572a52050
SHA1 hash:
daff31cdaf918c7685f0b4ff828211bdd7364589
Detections:
win_raccoon_auto
Parent samples :
e15eca7be72dec23df207af8366166fdd6e4bc2b878477c5aaaba5e2a9b4330d
22ebb950592ccc987fd1dab9ddcd34c4fc519975dc1b82e4a793dc038d2d8e41
3637e86adb20ccee0c96ac838cbba3f61cc1ac0e27fa04766957f7ef28825461
f7ea17d6aa49172752b69d2b1b63f8d22cf064c4f2ea2c3dc97c6b815b324cf0
89c7c028a7e7f95a3595dade72ac1f48da3c71fa3e482347a5a61a714dd57d0c
4e1a1db6d3dc39b67666d1e0304a7477fac814e1fbb7068560abc5eab2168c20
e88ecbbe677d8cfb97ba9a42db6f8b038aa96526b283b9de8635a80dd25790dd
a048547702aaf89637813c4cdc925cf25ab7a3710bfc95f21046be931c1cae63
fd21e7dddc8ed426971983f819be29e6fa123dcdfb19d87fbbbffa12c147188e
74bb6b2e6e0fb719237cb58c1ed17a91032ff3c8a3c11da92011b8e0ba5a1179
523c3d9d49ff39f7f97331e9d89c18053ab85c80f2ead0b505cc7e27e7aa2fcd
738bc607c1a64d1867103f3f4b6558c89401c539c34422d1e7a20fe634828cea
6e004cb6c3f1c0338a20692c375de17324c45e5176e80c6602ae2b1bed2bd4c8
22ebb950592ccc987fd1dab9ddcd34c4fc519975dc1b82e4a793dc038d2d8e41
3637e86adb20ccee0c96ac838cbba3f61cc1ac0e27fa04766957f7ef28825461
f7ea17d6aa49172752b69d2b1b63f8d22cf064c4f2ea2c3dc97c6b815b324cf0
89c7c028a7e7f95a3595dade72ac1f48da3c71fa3e482347a5a61a714dd57d0c
4e1a1db6d3dc39b67666d1e0304a7477fac814e1fbb7068560abc5eab2168c20
e88ecbbe677d8cfb97ba9a42db6f8b038aa96526b283b9de8635a80dd25790dd
a048547702aaf89637813c4cdc925cf25ab7a3710bfc95f21046be931c1cae63
fd21e7dddc8ed426971983f819be29e6fa123dcdfb19d87fbbbffa12c147188e
74bb6b2e6e0fb719237cb58c1ed17a91032ff3c8a3c11da92011b8e0ba5a1179
523c3d9d49ff39f7f97331e9d89c18053ab85c80f2ead0b505cc7e27e7aa2fcd
738bc607c1a64d1867103f3f4b6558c89401c539c34422d1e7a20fe634828cea
6e004cb6c3f1c0338a20692c375de17324c45e5176e80c6602ae2b1bed2bd4c8
SH256 hash:
b56b333218590e42264e3c569891875e6e2c9955d322f2a1a940c53a09cefb63
MD5 hash:
d01a52c156a6a80dd6c12fa897159f94
SHA1 hash:
173411cd147973b6366c11bbbbf87bafcfa4403a
SH256 hash:
9c00e935a41bb1dc0b2b65ac18c0a1be05bdc555676e7eb8a830590b52e55436
MD5 hash:
e7526d8f9a8f888b75b85f9a1ebae3dc
SHA1 hash:
79ca1cbf3184302db8defa924c43295106021c7e
SH256 hash:
ee821f8bf24cec68cced8a322129e322a9e5a20f2d92dd2f0b0827aff4711343
MD5 hash:
5eda69604c85537ab3fbaf77da60b2cb
SHA1 hash:
5d0a8f3efa0b26f52fe36eac2583ac419b6dd11d
SH256 hash:
943837b60d7049535824aa6ca80f3d6edd3630a8b183e14a3360844e60414941
MD5 hash:
2a4b245081f6435bd40a6b81ad868f4e
SHA1 hash:
22163e4421f613c6b6bd0624f8bce814ebf7cefc
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
da37723dbc887717a85940cdc3bda4a630d31e94a7af355558452a7c8d8ca5de
MD5 hash:
18f6ecc14ec6cbf833e7ab3dd31b5b36
SHA1 hash:
c2da6b4b158331a7f7bb9fa47f111e6fec7b8ecb
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
6ecaba189f108ba0dc83214fa41e43307fdc79147717f2ac68cd832181db9666
MD5 hash:
70768beb1a282fc79ecf19a0a73286f5
SHA1 hash:
e40e4b259715e740c83e3cc27a5654ea3c7bfa37
SH256 hash:
fef7035989f56b8ab573adb9d3d91363668af7b0b71d4cb44d52f941fde3ad4f
MD5 hash:
b712d9cd25656a5f61990a394dc71c8e
SHA1 hash:
f981a7bb6085d3b893e140e85f7df96291683dd6
SH256 hash:
fe67cbec69eb8e962d6a2eba67d72a55b2fb9e6d12ce2b813471a433d3097ef8
MD5 hash:
9c46efa08545c299c3707c96617502ad
SHA1 hash:
f2dab3af134f8481f20410c8c331a4abb8e60da8
SH256 hash:
67cdf97d94458b0543d1362423e4d8b6104577176c167e5f49346765f13921ae
MD5 hash:
e2830da892883cc69651cff61b80df8d
SHA1 hash:
da2f1e120f8d70b8a0184d9d7dcaa62f89300823
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
451c693481de62b1a2768050df0e7aba4d7eaa2c70ef924ccc5992f947d27b70
MD5 hash:
2fa2b1760a549b8a8988fbf66c0204ab
SHA1 hash:
cf0a32127dd6d688fbebd56f6c2b672455b5683d
SH256 hash:
3037cd2d2cc38cb14693fda35610a692139c163d827592c55bc98524e2614319
MD5 hash:
1b20a20a1ef8327a2584706923ae4b5c
SHA1 hash:
c077cb5c771cb25bfa3d9e648c875d34d9b73533
SH256 hash:
180e07da7b40b416e4fc116fff216e5550a47755d0d1aaf97e45bea9d0cfb2e1
MD5 hash:
2599697aa85d3a737660b4183d1fcb9d
SHA1 hash:
ae0069a5a895e2e83b9e624f06da7c3c25f8830e
SH256 hash:
e387a96090de76fa8fc4aabb72463f882e39d818289b469192a5543a1223cc83
MD5 hash:
f0136ccf09a0faf87aca0a359b64a1d9
SHA1 hash:
9684bd0a4d2cf4f3fe06b4cfedfa63fa2c070bff
SH256 hash:
64f55d5e15b9dbbb0d6e16ffb9aceaee91ee440beef80e4cd1b74b0ded11c7c1
MD5 hash:
1404f942070e57b2ef0b6b3693f730be
SHA1 hash:
7ef83b925afb34c52627b66ad960400fbc1bf776
SH256 hash:
e9dd6a71eff3d083e599193635ef8e79f2fddbf684b1c060341f6be6f404f805
MD5 hash:
8a9f67a047d7911079adcec680670eeb
SHA1 hash:
73e5505b9990d96bab4df7037df0d1c448286162
SH256 hash:
8dfa64ad56ba631670314cc23eaaff08bb164afea5a82e4cee6a7e4365156f5c
MD5 hash:
e9e43fbc64582a35bf5ef4e0cde9bc6e
SHA1 hash:
6d7060a2bd03817608578f6a0a5bcdc91bd2a3c4
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
daac8a83ef74a2238dff6968dcf2e1288c3948331fe45c9d7c778615ad0a77c1
MD5 hash:
0ff744a1883ec12fe21a171e4f5938c0
SHA1 hash:
332aeb5e653469146b877452062d0302b2c6825d
SH256 hash:
78eebe984e9169ce111b166dc4edbd9ba42f9e17c08ef3eab99bf410f24b375d
MD5 hash:
c2962217c30c5b1f4367a5b0c1c07749
SHA1 hash:
2c6713186af01f86b97f5daa370085e5ebc7e5ae
SH256 hash:
ea17e106fcb5c6225b7d103f210e30e4bda84209212e42804c9aa5675e4b5c59
MD5 hash:
2c7afa6d2aba0ee8ded1e9259ca46a45
SHA1 hash:
20935818387028b6a1fa57e5dc75968b912cf78e
SH256 hash:
3b5f2f0831231e25c1ac035adac503049d218e9df598a93b32a65a0e82ad31e2
MD5 hash:
0fa197e3ffb789dac6da8b9bd09f2d64
SHA1 hash:
04e79e27b4b2f0ac42636640282c6195246a67b0
SH256 hash:
6ca972b43d38046b25d61c92aaa889e3d7bf4f309f4b92c36efbc352fa4826aa
MD5 hash:
a424d94945c00b4be3f48e66efce48b6
SHA1 hash:
5b93cce8af09eb8347ce40f56af20c4a6df0b279
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
d595558acc185380de36007a2ff97bdceb6c120deed6384c6408fa3a914b9b74
MD5 hash:
9044a6e6aaef2d01907a40f3dff8ad11
SHA1 hash:
15be1ea005982448ccf8e930513b7ce16f98a97b
SH256 hash:
d0216cbf558d1d45fd7d64cd4e35e604043840becb4aebd6234f8ca13d5a8bf0
MD5 hash:
a90d7c39fd91f3b14b0976f2077150dc
SHA1 hash:
fa9be9f5be588d731eead699255fdae27712419d
SH256 hash:
037e50a6299cba8a68745800c34a8951968792385ba0b610997134951f98d428
MD5 hash:
15f2d71a5095758bcac608f4f5c4aa5a
SHA1 hash:
058c1e39cb5b1c317f6c9d4b009fe19601e4d430
SH256 hash:
e6c4ab2166e34505d0a8351412c309ca8c291c5f0233b9c4e08c3c9f02705fba
MD5 hash:
92ff52239f50ae709ffde8fccf3ff5f0
SHA1 hash:
1ec5d8a96512c14a8728b28397b62fbd5e94ae1d
SH256 hash:
64364f578f09aecafd806744b758bf2dbae3cb7440c649268a8e034d16d50bd6
MD5 hash:
74e5ad382b68145dc8b676c81c24f996
SHA1 hash:
6075d1c5ff58f1fa207fec92536be2475bf768b8
SH256 hash:
a048547702aaf89637813c4cdc925cf25ab7a3710bfc95f21046be931c1cae63
MD5 hash:
0b51a56e6b3393ff04e6cc6fced4e068
SHA1 hash:
7e828cc8ef5d5bc0ec14b40850c999d92b730995
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.