MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b27943da09b070cdf931f219984746e3c275ebf7985560feabb597d1d2bb6c6f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: b27943da09b070cdf931f219984746e3c275ebf7985560feabb597d1d2bb6c6f
SHA3-384 hash: 7d4456d690e42de172d0f82d95048cab2544ddcfee82a72b24b5fee7bca69b98a0ecf666576b4f6c3d6ccf51927869d4
SHA1 hash: a0ca9bc4336c829bd3de85e2d92a2598a938b580
MD5 hash: a5431c8b5f858e14edbc94be92012d58
humanhash: green-happy-wisconsin-delta
File name:a5431c8b5f858e14edbc94be92012d58.exe
Download: download sample
Signature RaccoonStealer
File size:449'536 bytes
First seen:2021-12-05 00:31:03 UTC
Last seen:2021-12-05 03:08:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9d24ccac58ecf11e70c100743c701d44 (2 x RedLineStealer, 2 x Amadey, 2 x RaccoonStealer)
ssdeep 12288:MB6s6YziF2CLwjS29GZ6h76Bh3YPUYdFtyXWNCtfsZl:06e42CKb9Y6IBUUkMmC0
Threatray 4'391 similar samples on MalwareBazaar
TLSH T176A4020039D7C875D6AB163038B5C7A1697B3D362A31054A37A8267D7EF21C3AEE5B43
File icon (PE):PE icon
dhash icon fcfc94d4d4d4d8c0 (24 x RaccoonStealer, 21 x RedLineStealer, 9 x Smoke Loader)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://194.180.174.40/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://194.180.174.40/ https://threatfox.abuse.ch/ioc/259462/

Intelligence


File Origin
# of uploads :
2
# of downloads :
288
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a5431c8b5f858e14edbc94be92012d58.exe
Verdict:
Suspicious activity
Analysis date:
2021-12-05 00:34:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Sending an HTTP GET request
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer exploit glupteba lockbit packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw
Score:
64 / 100
Signature
Contains functionality to steal Internet Explorer form passwords
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2021-12-02 19:42:49 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
08d7cf69dd3b668c65b820dafd571f9cc168dd46eeb0f18830ef3c3c1ce4703f
MD5 hash:
19bdbf4f6907dc60077bfc1628162ae4
SHA1 hash:
a488722db9cc96f98fee1cb2af8656d9c2417799
Detections:
win_raccoon_auto
SH256 hash:
b27943da09b070cdf931f219984746e3c275ebf7985560feabb597d1d2bb6c6f
MD5 hash:
a5431c8b5f858e14edbc94be92012d58
SHA1 hash:
a0ca9bc4336c829bd3de85e2d92a2598a938b580
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments