MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a972fe56cf0c891775ab81e23a90e553956c06623350fc91d4e7cdce3dfd3170. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: a972fe56cf0c891775ab81e23a90e553956c06623350fc91d4e7cdce3dfd3170
SHA3-384 hash: 9b55e76fa66d7d703073c4e8b1f35625ef8548241ad580616bd6b4e140b0c47692e594342a770a634bbfb1c5667075d6
SHA1 hash: e0bb4cdbf14e832bf91a5e412ccc2827b760eaab
MD5 hash: 55da799f20ed9469858a6834bdbbb3b3
humanhash: cup-october-moon-pluto
File name:55da799f20ed9469858a6834bdbbb3b3.exe
Download: download sample
Signature RaccoonStealer
File size:431'620 bytes
First seen:2021-11-04 17:20:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5d9f5e56d1ff2d59502bc31bee028486 (1 x RaccoonStealer)
ssdeep 6144:XCUkof/AkyO2cwzJmYejJW9bRqX7Uu0XdVro+IrjnGig2rxARsc9CksgftcDN:XCUkonAkF2RVy8IXQJV8+yjGMxKQgOD
TLSH T1E19402103271C13FE5E615B05C78DAA539B7B8636674818F77946A3E2F203C09A7AB1F
File icon (PE):PE icon
dhash icon 480c1c4c4b594b14 (8 x RedLineStealer, 5 x Smoke Loader, 2 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
55da799f20ed9469858a6834bdbbb3b3.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-04 17:22:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-11-04 17:21:07 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:b3ed1d79826001317754d88a62db05820a1ecd19 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Raccoon
Unpacked files
SH256 hash:
25a4b6c6b34adf706411f6f6b91c46de7a80728964492e6eb11f2281e9678717
MD5 hash:
2f9b640b36cbd54b3c835289cc8075cd
SHA1 hash:
9e849ddf0cbb3291065a12408bc798c7cd7686d9
Detections:
win_raccoon_auto
SH256 hash:
a972fe56cf0c891775ab81e23a90e553956c06623350fc91d4e7cdce3dfd3170
MD5 hash:
55da799f20ed9469858a6834bdbbb3b3
SHA1 hash:
e0bb4cdbf14e832bf91a5e412ccc2827b760eaab
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe a972fe56cf0c891775ab81e23a90e553956c06623350fc91d4e7cdce3dfd3170

(this sample)

  
Delivery method
Distributed via web download

Comments