MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 afa36bb91cf7dfbf9725d0e1f9a9dcb91f46d85bc34ac5be098608a64314c659. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 10 File information Comments

SHA256 hash: afa36bb91cf7dfbf9725d0e1f9a9dcb91f46d85bc34ac5be098608a64314c659
SHA3-384 hash: 8f87715c29707bb1a22600180cdba2a8a5959073ef8918a8e17e353333ec3cb2ea81c5241d5b9ca198c1d72bdceea3e1
SHA1 hash: 3ebafde1b3971df3baa9b1da63f69a7d6ba1ea79
MD5 hash: 7834184542ed2a3b7c2a80493db69fa2
humanhash: golf-queen-cola-utah
File name:7834184542ED2A3B7C2A80493DB69FA2.exe
Download: download sample
Signature RaccoonStealer
File size:3'483'264 bytes
First seen:2021-08-30 03:11:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xGCvLUBsgRMOjXs7bFLAqFwYVd4mUqZfnUJjVbEQy:xvLUCgRMeEbFcbY1UJxbEv
Threatray 442 similar samples on MalwareBazaar
TLSH T184F5332037ED45F6E9A55075AB80AFF160FD83A91F2049C7F718892C5F3E915E237A28
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://5.181.156.252/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.252/ https://threatfox.abuse.ch/ioc/201911/

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7834184542ED2A3B7C2A80493DB69FA2.exe
Verdict:
No threats detected
Analysis date:
2021-08-30 03:13:10 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Sending a UDP request
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 473644 Sample: k8OfDH1SCg.exe Startdate: 30/08/2021 Architecture: WINDOWS Score: 100 78 104.21.17.130 CLOUDFLARENETUS United States 2->78 80 162.159.130.233, 443, 49733 CLOUDFLARENETUS United States 2->80 82 5 other IPs or domains 2->82 104 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->104 106 Antivirus detection for URL or domain 2->106 108 Multi AV Scanner detection for dropped file 2->108 110 11 other signatures 2->110 11 k8OfDH1SCg.exe 16 2->11         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\setup_install.exe, PE32 11->50 dropped 52 C:\Users\user\...\Thu16f866d34f070.exe, PE32 11->52 dropped 54 C:\Users\user\...\Thu16f6d22fa35bf3c92.exe, PE32 11->54 dropped 56 11 other files (3 malicious) 11->56 dropped 14 setup_install.exe 1 11->14         started        process6 dnsIp7 100 hsiens.xyz 172.67.142.91, 49727, 80 CLOUDFLARENETUS United States 14->100 102 127.0.0.1 unknown unknown 14->102 136 Performs DNS queries to domains with low reputation 14->136 138 Adds a directory exclusion to Windows Defender 14->138 18 cmd.exe 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 7 other processes 14->24 signatures8 process9 signatures10 27 Thu16f6d22fa35bf3c92.exe 18->27         started        32 Thu16f866d34f070.exe 20->32         started        34 Thu1614722a82b27e0.exe 22->34         started        112 Adds a directory exclusion to Windows Defender 24->112 36 Thu16082bd37a7f9c41.exe 2 24->36         started        38 Thu16049a953333.exe 1 13 24->38         started        40 Thu161bb50d9cd.exe 24->40         started        42 2 other processes 24->42 process11 dnsIp12 84 37.0.10.214, 49731, 80 WKD-ASIE Netherlands 27->84 86 37.0.10.237, 49732, 80 WKD-ASIE Netherlands 27->86 90 7 other IPs or domains 27->90 58 C:\Users\...\ya0aF9WFwhWrclC5qTXy1S00.exe, PE32+ 27->58 dropped 60 C:\Users\...\wsO7hWzVOg2J6mFv5sBFq0NX.exe, PE32 27->60 dropped 62 C:\Users\...\v9jUbprtlerqhK5zNsj6yB6P.exe, PE32 27->62 dropped 72 33 other files (28 malicious) 27->72 dropped 114 Drops PE files to the document folder of the user 27->114 116 May check the online IP address of the machine 27->116 118 Creates HTML files with .exe extension (expired dropper behavior) 27->118 120 Disable Windows Defender real time protection (registry) 27->120 92 2 other IPs or domains 32->92 64 C:\Users\user\AppData\...\softokn3[1].dll, PE32 32->64 dropped 66 C:\Users\user\AppData\...\freebl3[1].dll, PE32 32->66 dropped 74 10 other files (none is malicious) 32->74 dropped 122 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->122 124 Tries to harvest and steal browser information (history, passwords, etc) 32->124 126 Tries to steal Crypto Currency Wallets 32->126 128 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 34->128 130 Maps a DLL or memory area into another process 34->130 132 Checks if the current machine is a virtual machine (disk enumeration) 34->132 134 Creates processes via WMI 36->134 44 Thu16082bd37a7f9c41.exe 3 36->44         started        94 4 other IPs or domains 38->94 68 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 38->68 dropped 88 cdn.discordapp.com 162.159.129.233, 443, 49728, 49734 CLOUDFLARENETUS United States 40->88 70 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 40->70 dropped 96 2 other IPs or domains 42->96 file13 signatures14 process15 dnsIp16 98 live.goatgame.live 172.67.222.125, 443, 49721 CLOUDFLARENETUS United States 44->98 76 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 44->76 dropped 48 conhost.exe 44->48         started        file17 process18
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-08-27 07:51:29 UTC
AV detection:
34 of 46 (73.91%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:vidar botnet:706 aspackv2 backdoor dropper infostealer loader stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Vidar
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Unpacked files
SH256 hash:
bfe83abcafb14d03f744a6a74d1e2970728f457ef28eeddba2e3212d4bf5502c
MD5 hash:
5ab04d2cfbf7b8bcf6d2bda47a659a5f
SHA1 hash:
d920e017f9134231d1de36c510dcd2de81eada5c
SH256 hash:
349c01881bae7b05abab7eeed3e56e0018dda8441a8da3a34285d9248dfe1270
MD5 hash:
3e857ee868165e17e7b60cfee465336e
SHA1 hash:
c74b7d01177b02917de100bd542a85869f23ed5c
SH256 hash:
3bb5a16425c80dac7d673737390546c67a45fe54d09589e16afaee6baa0bab91
MD5 hash:
abe746d5255f705ead633473cf4d5285
SHA1 hash:
661814208fda754f8ad34b60c1123753258491ba
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
5a2934ac710f5995c112da4a32fde9d3de7d9ed3ea0ac5b18a22423d280b5c6d
MD5 hash:
951aaadbe4e0e39a7ab8f703694e887c
SHA1 hash:
c555b3a6701ada68cfd6d02c4bf0bc08ff73810e
SH256 hash:
5b1fc23120d38d3adfbe752d4338978a62d1bd46d7e3af0ec3f7a904ce1fa961
MD5 hash:
d8a088457cd1d4b6d2211ae0ce25064a
SHA1 hash:
a8365286bc62fc7b861c39c1f8014e24ba6c4f71
SH256 hash:
38d87be406e320b0aaff7cfb5d7f913cc12daf941254b69b50b7ac18cf202bb0
MD5 hash:
0aec67d72756e0d605257c4a3dc4500c
SHA1 hash:
693b46f4dec8cfd792cbcdde914ab51b84ac186f
SH256 hash:
ed6d502c7c263fd9bd28324f68b287aea158203d0c5154ca07a9bcd059aa2980
MD5 hash:
de595e972bd04cf93648de130f5fb50d
SHA1 hash:
4c05d7c87aa6f95a95709e633f97c715962a52c4
SH256 hash:
f54a8a7f59cd9422d349f7d7a09c9e2650e065d2f90c77b04d4a894a24b2b85c
MD5 hash:
aa0706276ce292ffab8f9fea3e3b7b4f
SHA1 hash:
3eb4585dd13fb074ef8ddb388ba0b18c911acebe
SH256 hash:
2d416fc388791b2a40c08e7e5e9de93316543945040ccefdf63f1b7dd4c975bd
MD5 hash:
608d202421179af70454b8fab585b551
SHA1 hash:
0c4cc5527ac4f22c5ab481a0bdcfce509c39c0e7
SH256 hash:
3ebc0335dcf16fc6447da181b05e0e4d65a35414573da0ce33af1bcf4f662c90
MD5 hash:
64712499cf126be9752e7cbecff98dd4
SHA1 hash:
a69c84c953c46aed947861399655d6c83a6708e5
SH256 hash:
00902ba2e7991dd5a4fe8568e1b5b7f181aea9561ae068710f766627f0571dd4
MD5 hash:
ca93ef88e1b9b46cc24bff517dbf1436
SHA1 hash:
6c25acfd9ccc66278c953d2396f80067a00f56e0
SH256 hash:
afa36bb91cf7dfbf9725d0e1f9a9dcb91f46d85bc34ac5be098608a64314c659
MD5 hash:
7834184542ed2a3b7c2a80493db69fa2
SHA1 hash:
3ebafde1b3971df3baa9b1da63f69a7d6ba1ea79
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments