MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7ae2843ba9ab452c9588cb8a3cd0a1dc4d66d72d23416238af3e256ac269a89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs 2 YARA File information Comments

SHA256 hash: a7ae2843ba9ab452c9588cb8a3cd0a1dc4d66d72d23416238af3e256ac269a89
SHA3-384 hash: fd6cc8f8e2abb0a728984d96fc17a908a9004ad651834c4bf20f77575fe690694f7e0042e67e9ca87860be1d9e0d4bea
SHA1 hash: eb47cafd5f1cf6a05ef9943980285ee77a36c413
MD5 hash: a2b2c70c9568f5fc953fdac6e6384b13
humanhash: one-tennis-thirteen-glucose
File name:a2b2c70c9568f5fc953fdac6e6384b13.exe
Download: download sample
Signature RaccoonStealer
File size:12'767'844 bytes
First seen:2021-12-04 02:45:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 196608:xILUCg+wDRhIk2pDgpYFPo1WptxdPAg+ctmucfR820ues0CkUGiqdRRcK101KD:xEdg+E/B2VIqtPp+O20uetiqdRRJj
Threatray 785 similar samples on MalwareBazaar
TLSH T1B2D633407581D7F7CD21E1397F8CABF1E736D7A42B12364B7B42821E686A58F302D2A5
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://194.180.174.53/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://194.180.174.53/ https://threatfox.abuse.ch/ioc/259049/
185.215.113.67:30242 https://threatfox.abuse.ch/ioc/259157/

Intelligence


File Origin
# of uploads :
1
# of downloads :
220
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a2b2c70c9568f5fc953fdac6e6384b13.exe
Verdict:
No threats detected
Analysis date:
2021-12-04 02:46:51 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
DNS request
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
Creating a window
Searching for synchronization primitives
Launching cmd.exe command interpreter
Creating a process with a hidden window
Creating a file
Delayed writing of the file
Using the Windows Management Instrumentation requests
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Behaviour
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Metasploit Raccoon RedLine SmokeLoader S
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Disables Windows Defender (via service or powershell)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May modify the system service descriptor table (often done to hook functions)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected AntiVM3
Yara detected Metasploit Payload
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 533742 Sample: rPPZ9xMp91.exe Startdate: 04/12/2021 Architecture: WINDOWS Score: 100 67 193.38.54.238 SERVERIUS-ASNL Russian Federation 2->67 69 91.219.236.162 SERVERASTRA-ASHU Hungary 2->69 71 8 other IPs or domains 2->71 81 Antivirus detection for URL or domain 2->81 83 Antivirus detection for dropped file 2->83 85 Multi AV Scanner detection for dropped file 2->85 87 27 other signatures 2->87 10 rPPZ9xMp91.exe 25 2->10         started        signatures3 process4 file5 47 C:\Users\user\AppData\...\setup_install.exe, PE32 10->47 dropped 49 C:\Users\user\AppData\...\Wed13ed36b0f7.exe, PE32 10->49 dropped 51 C:\Users\user\AppData\...\Wed13d379bdf34.exe, PE32 10->51 dropped 53 20 other files (12 malicious) 10->53 dropped 13 setup_install.exe 1 10->13         started        process6 signatures7 119 Adds a directory exclusion to Windows Defender 13->119 121 Disables Windows Defender (via service or powershell) 13->121 16 cmd.exe 13->16         started        18 cmd.exe 1 13->18         started        20 cmd.exe 13->20         started        22 14 other processes 13->22 process8 signatures9 25 Wed138da4a094.exe 16->25         started        28 Wed138a503092b.exe 18->28         started        32 Wed13d379bdf34.exe 20->32         started        89 Adds a directory exclusion to Windows Defender 22->89 91 Disables Windows Defender (via service or powershell) 22->91 34 Wed13b072e5455eef.exe 22->34         started        36 Wed136c1211be1781.exe 22->36         started        38 Wed13b9ac8c5cdb5c796.exe 22->38         started        40 7 other processes 22->40 process10 dnsIp11 93 Antivirus detection for dropped file 25->93 95 Multi AV Scanner detection for dropped file 25->95 97 Machine Learning detection for dropped file 25->97 99 Sample uses process hollowing technique 25->99 73 208.95.112.1 TUT-ASUS United States 28->73 75 8.8.8.8 GOOGLEUS United States 28->75 79 2 other IPs or domains 28->79 55 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 28->55 dropped 42 11111.exe 28->42         started        101 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 32->101 103 Checks if the current machine is a virtual machine (disk enumeration) 32->103 105 Query firmware table information (likely to detect VMs) 34->105 107 Tries to detect sandboxes / dynamic malware analysis system (registry check) 34->107 109 Injects a PE file into a foreign processes 36->109 77 104.21.96.57 CLOUDFLARENETUS United States 38->77 57 C:\Users\user\AppData\...\0zoJhVtvljb.exe, PE32 38->57 dropped 59 C:\Users\user\AppData\Roaming\xuFF318kW.exe, PE32 38->59 dropped 61 C:\Users\user\AppData\Roaming\xX3E0pg.exe, MS-DOS 38->61 dropped 65 4 other files (none is malicious) 38->65 dropped 63 C:\Users\user\...\Wed13bcd43832509.tmp, PE32 40->63 dropped 111 Obfuscated command line found 40->111 113 Adds a directory exclusion to Windows Defender 40->113 45 mshta.exe 40->45         started        file12 signatures13 process14 signatures15 115 Multi AV Scanner detection for dropped file 42->115 117 Tries to harvest and steal browser information (history, passwords, etc) 42->117
Threat name:
Win32.Trojan.Jaik
Status:
Malicious
First seen:
2021-12-02 01:41:11 UTC
File Type:
PE (Exe)
Extracted files:
182
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:redline family:socelars family:vidar botnet:915 aspackv2 discovery evasion infostealer spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Amadey
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://www.wgqpw.com/
https://qoto.org/@mniami
https://noc.social/@menaomi
185.215.113.35/d2VxjasuwS/index.php
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
1bbf1271ce5c9dc20b595fdf1f516166f65b443599fc835607008666296983ff
MD5 hash:
49fc2ee06ab4c4b533cf9ce484c02adf
SHA1 hash:
b90f22613578232b8bf377377ea5c4d84b37b0a7
Detections:
win_zloader_g1
Parent samples :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 hash:
715c468aae9722bde10a09ac27ee35f9bbf3de2a58ee19bd9d5f5a68a7b6837a
MD5 hash:
b6d1c8c7140a42d260186eccc6f5c700
SHA1 hash:
bebd7d53c3cacb295a466ac53de1015cfc6afabb
SH256 hash:
457255708980b4ff653d68b2a4469963d76a31d84f2545efc2acb4d79084a27d
MD5 hash:
0eee8efc13784eb16465f72e78aac091
SHA1 hash:
a2d68894732507f45a28ce2b8903c9e8869aeb69
SH256 hash:
1e38e10b937be88caf62ee6b27a911ca3e3479bdf0c4cae89f30190b14b77fdc
MD5 hash:
28074a8b5baf2c448206f702c483a546
SHA1 hash:
2657f0d2a01f043f934eee726333da9ac217175f
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
db51913dcbd74a51e46f4d8dca34ddaf44a928fd5250b34858b9d165dd68eca4
MD5 hash:
74f0d39f05f13a059791497a61471842
SHA1 hash:
f5c39e3b0429cba32f009b191d12b590378aa51e
SH256 hash:
6ecaba189f108ba0dc83214fa41e43307fdc79147717f2ac68cd832181db9666
MD5 hash:
70768beb1a282fc79ecf19a0a73286f5
SHA1 hash:
e40e4b259715e740c83e3cc27a5654ea3c7bfa37
SH256 hash:
fef7035989f56b8ab573adb9d3d91363668af7b0b71d4cb44d52f941fde3ad4f
MD5 hash:
b712d9cd25656a5f61990a394dc71c8e
SHA1 hash:
f981a7bb6085d3b893e140e85f7df96291683dd6
SH256 hash:
aa4bae2f904690d0df99ecaed0a64b4625419b08095f0defc20fe1b08dde82e5
MD5 hash:
02988c2a9ba0be9e6b4f781602b8b1fb
SHA1 hash:
d3e196e0a676c0e32386d8b8a0c6a0b9ecbf4a1f
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
3eed8f476cbe82ee2190812336f99e53f473104eed85361086e80e0c74cfc9bc
MD5 hash:
302f8fd0c67fafb79968c9336aaf005c
SHA1 hash:
cf0e652de7362bd9953e8e30523f0fd8037eef15
SH256 hash:
451c693481de62b1a2768050df0e7aba4d7eaa2c70ef924ccc5992f947d27b70
MD5 hash:
2fa2b1760a549b8a8988fbf66c0204ab
SHA1 hash:
cf0a32127dd6d688fbebd56f6c2b672455b5683d
SH256 hash:
77cbb28dc4ae388a92b496ef55f95da09879877db6e1f132bf16d0b939d03f56
MD5 hash:
218120f703679a566e95375e14dfea64
SHA1 hash:
ad3cd87288877c302c7fe1bfed1301197c520439
SH256 hash:
04f2ce1dcc4c03f0c0a9a2a10c95598bde70d207a64e8d35058438a43fa65eb5
MD5 hash:
2aeb1ef3c3b4e1aa0cb5508666849e6e
SHA1 hash:
ac364e4c7ce67bf0991659babf74f54d5c68b8d3
SH256 hash:
66fd027b1b17d9fc3647fd6922bd7bcca62c97fab303293fc6ace3144ab5fe94
MD5 hash:
cd33c50788674c765ef996a8ab4aafac
SHA1 hash:
a1512ca6f77f952f1b50b4d470d68a243cdb5a66
SH256 hash:
897703f2e2de2439f3f049eb889a4be81eb70348e9e7477d2a76baebac9098ed
MD5 hash:
fb0e585dfbe465996c20de1557910f08
SHA1 hash:
8d9f2fd8d3c76d76ddeef8d1302e24e8d7ac49e4
SH256 hash:
97d978dce2becb0ae8a9f95c21acc6a5520a897fd60ac15162854f275525965c
MD5 hash:
3021f4969b72d48e8fdab2b6330389f2
SHA1 hash:
6d10a3bdc07fb957de2ee46eb08b40a8970939c2
SH256 hash:
5c83411b40f3426cd9982db10cfb28df17b73c73852490a14ee28258735ae814
MD5 hash:
29cac5a022b0b814e684d0d1fb16ef7f
SHA1 hash:
4b9f2d30030eae606dcb13ae88b6f409f618754d
SH256 hash:
868be5a57fa68f4e5e9b22bd94528f6e44745be09dc5809df963c03854f630d5
MD5 hash:
cc4d8cb0fe56fe222a8095f9d5f39dde
SHA1 hash:
41ee3272edb4ec9536a673bce61626939d4cb2ba
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
a31855fbb90f16dc9fe7334f222c17b961f8d3bcefbb19f7d79bc4e81a1f7d48
MD5 hash:
673e9727ca87e0d86b2d7dac6c9ab743
SHA1 hash:
1bfeb2dbd4f805d4f55a73284b7022336cf549e3
SH256 hash:
2ac2f22f376075b29c0b6c787c57ce9a70ef0727bfb1617c3bfb94198bfa7640
MD5 hash:
f9c6d895abb9e1dac411cf78baeb5dfb
SHA1 hash:
16445ba3e98d44624eb922f7d28ca1b7bbcce1bd
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
a174e0d67eca3a59399994a54a44f4f2b7584f286dcf3cdb7a80f1ef83c010c6
MD5 hash:
b3b683d8cb51a926977080d7f7cf4bf5
SHA1 hash:
82eb466d03c72417f1a3f1320ccb732899af5e88
SH256 hash:
a6dbb8fa4889d23ab0273f902a8ed1cb21e086d1b41709fb8c23f8fcaac6d089
MD5 hash:
1e0bcbc30f6ec05e5ec01f32bf4142f2
SHA1 hash:
e1dded8506eb90d83a255415717a77afd371f2e1
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
6113797c8f9b65e0336d2b46905130889f94ae6414acbc0fdbae7f858c221b36
MD5 hash:
1b115cb589ef921a000505e6c63653c3
SHA1 hash:
dd6abd220a749ab544fb4c3757864d61862902cc
SH256 hash:
d03ba4ca054f84c7d1ba63ec4b90e4d81c6f83d0e8a97f6d12f8db03514ba628
MD5 hash:
2e6dda1e671474fe434d0bb4b971c952
SHA1 hash:
8ad9cb66938b59b2dd4a92be8443e705ec1586cd
SH256 hash:
757eb2591640380bed0a28e86fb1f7743272a91fe0531d003115718ad2b81bb4
MD5 hash:
c8fe3d4e2b9bdc33a3abb5db7edea076
SHA1 hash:
d0bbab6ffb7f0f931d31a78e2881c86269fc71ca
SH256 hash:
99c5d2c07d64b93112d2d3dc2382709bc403b25ebd2cd14e5d930125e54a9126
MD5 hash:
1eb441892ceff9c8fd072f8ab7720f6d
SHA1 hash:
e7b71e612b58f347d48ea9a721e46be57ca243b6
SH256 hash:
a7ae2843ba9ab452c9588cb8a3cd0a1dc4d66d72d23416238af3e256ac269a89
MD5 hash:
a2b2c70c9568f5fc953fdac6e6384b13
SHA1 hash:
eb47cafd5f1cf6a05ef9943980285ee77a36c413
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments