MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7097d8faff9c2e6cec6799d715727ff40a14cddee4abd0377286d6adbb63fdd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: a7097d8faff9c2e6cec6799d715727ff40a14cddee4abd0377286d6adbb63fdd
SHA3-384 hash: 9eeeb8245d80170db22dc1e5ea95154ca2e429cd43361a3981ef32c2e23b1b30136f624fc400614c13b9f8fc5a9ebce2
SHA1 hash: f0a417e72ad32ab06b44ef9f5f14369f76eba9f2
MD5 hash: 226397991361d4e8b2edffb52931af94
humanhash: cup-batman-jig-sweet
File name:226397991361d4e8b2edffb52931af94.exe
Download: download sample
Signature RaccoonStealer
File size:1'410'280 bytes
First seen:2021-09-09 15:50:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 34e5fe6fb5f5380bef6d2b2739841a17 (2 x RaccoonStealer, 1 x DanaBot, 1 x ArkeiStealer)
ssdeep 24576:drdO1cGixvcjfY8G7bRbpd41VyiZTZAaMSyRda2oWZzfyzZ2TVcs:MimLY8G7bRbpd4nNTZAal0a8zfy8T1
Threatray 168 similar samples on MalwareBazaar
TLSH T1936512306E9CE025E5B615F0467AC3B96A297FB1772041CB63C56ADEE674BD08C30B4B
dhash icon 9824e790c4e72158 (31 x RedLineStealer, 18 x Smoke Loader, 16 x ArkeiStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
175
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
226397991361d4e8b2edffb52931af94.exe
Verdict:
Suspicious activity
Analysis date:
2021-09-09 15:53:39 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Reading critical registry keys
Sending a UDP request
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-09 15:51:11 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Unpacked files
SH256 hash:
91d812e325f532993824647f8f4c63723f9e944767225aeda3672904563cb362
MD5 hash:
363dc0d4e7cd6ad13fe56c94ad65ee00
SHA1 hash:
e7afa73dba5602886af54a874430fc808b654c5a
SH256 hash:
a7097d8faff9c2e6cec6799d715727ff40a14cddee4abd0377286d6adbb63fdd
MD5 hash:
226397991361d4e8b2edffb52931af94
SHA1 hash:
f0a417e72ad32ab06b44ef9f5f14369f76eba9f2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe a7097d8faff9c2e6cec6799d715727ff40a14cddee4abd0377286d6adbb63fdd

(this sample)

  
Delivery method
Distributed via web download

Comments