MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b566e04e4dde55640065fa942fcfa35ec3cb5f0c8b6057bfd0039ac4ebbc65f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 15 File information Comments

SHA256 hash: b566e04e4dde55640065fa942fcfa35ec3cb5f0c8b6057bfd0039ac4ebbc65f7
SHA3-384 hash: 0a68310e70fad0dc1627c24e28ec089bdcea68fc54bfe08533b052013e4c555f25a92f8a643fbc65076449f27986e741
SHA1 hash: f4555ab40925523a3183adb353cde2d80aa5fad8
MD5 hash: b499d366f01242597e6386fcbbbacfb7
humanhash: three-black-hamper-fix
File name:B499D366F01242597E6386FCBBBACFB7.exe
Download: download sample
Signature RaccoonStealer
File size:3'940'561 bytes
First seen:2021-06-13 15:25:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xTCvLUBsgtGTlSQMlY2Xqn0JvuQErXZPNTQULOTLATU6sK:xoLUCgt7Xq0Nl0XZZnt
TLSH B50633827FC9C4FAF55262304A5A2F7025FEC68C07F4BCABB324D50A4E5CB61C969D16
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
45.67.228.160:25738

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.67.228.160:25738 https://threatfox.abuse.ch/ioc/102059/

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
B499D366F01242597E6386FCBBBACFB7.exe
Verdict:
No threats detected
Analysis date:
2021-06-13 15:29:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending a UDP request
Sending an HTTP GET request
Deleting a recently created file
Creating a file
Creating a window
Creating a process with a hidden window
Reading critical registry keys
Launching a process
Connecting to a non-recommended domain
Creating a file in the %AppData% directory
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Defender launch
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433745 Sample: jo3GzZMQBG.exe Startdate: 13/06/2021 Architecture: WINDOWS Score: 100 151 52.255.188.83 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->151 181 Multi AV Scanner detection for domain / URL 2->181 183 Found malware configuration 2->183 185 Malicious sample detected (through community Yara rule) 2->185 187 13 other signatures 2->187 11 jo3GzZMQBG.exe 17 2->11         started        14 svchost.exe 2->14         started        17 haleng.exe 2->17         started        20 2 other processes 2->20 signatures3 process4 dnsIp5 101 C:\Users\user\AppData\Local\...\metina_6.exe, PE32 11->101 dropped 103 C:\Users\user\AppData\Local\...\metina_2.exe, PE32 11->103 dropped 105 C:\Users\user\AppData\Local\...\metina_1.exe, PE32 11->105 dropped 107 12 other files (none is malicious) 11->107 dropped 22 setup_install.exe 1 11->22         started        225 Sets debug register (to hijack the execution of another thread) 14->225 227 Modifies the context of a thread in another process (thread injection) 14->227 25 svchost.exe 14->25         started        145 69.171.250.35 FACEBOOKUS United States 17->145 28 jfiag3g_gg.exe 17->28         started        30 jfiag3g_gg.exe 17->30         started        32 WinHoster.exe 20->32         started        file6 signatures7 process8 dnsIp9 153 8.8.8.8 GOOGLEUS United States 22->153 155 104.21.56.66 CLOUDFLARENETUS United States 22->155 157 127.0.0.1 unknown unknown 22->157 34 cmd.exe 1 22->34         started        36 cmd.exe 1 22->36         started        38 cmd.exe 1 22->38         started        40 7 other processes 22->40 159 198.13.62.186 AS-CHOOPAUS United States 25->159 189 Query firmware table information (likely to detect VMs) 25->189 191 Tries to harvest and steal browser information (history, passwords, etc) 28->191 signatures10 process11 process12 42 metina_6.exe 34->42         started        47 metina_1.exe 91 36->47         started        49 metina_4.exe 2 38->49         started        51 metina_3.exe 8 40->51         started        53 metina_2.exe 1 40->53         started        55 metina_5.exe 3 2 40->55         started        57 3 other processes 40->57 dnsIp13 167 172.67.206.72 CLOUDFLARENETUS United States 42->167 109 C:\Users\user\AppData\Roaming\6294351.exe, PE32 42->109 dropped 111 C:\Users\user\AppData\Roaming\4758663.exe, PE32 42->111 dropped 113 C:\Users\user\AppData\Roaming\3807253.exe, PE32 42->113 dropped 195 Detected unpacking (changes PE section rights) 42->195 197 Detected unpacking (overwrites its own PE header) 42->197 59 4758663.exe 42->59         started        63 6294351.exe 42->63         started        65 3807253.exe 42->65         started        169 159.69.20.131 HETZNER-ASDE Germany 47->169 179 2 other IPs or domains 47->179 123 12 other files (none is malicious) 47->123 dropped 199 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 47->199 201 Tries to harvest and steal browser information (history, passwords, etc) 47->201 203 Tries to steal Crypto Currency Wallets 47->203 68 cmd.exe 47->68         started        115 C:\Users\user\AppData\Local\...\metina_4.tmp, PE32 49->115 dropped 70 metina_4.tmp 49->70         started        125 4 other files (none is malicious) 51->125 dropped 72 rundll32.exe 51->72         started        117 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 53->117 dropped 205 DLL reload attack detected 53->205 207 Renames NTDLL to bypass HIPS 53->207 209 Checks if the current machine is a virtual machine (disk enumeration) 53->209 171 208.95.112.1 TUT-ASUS United States 55->171 173 31.13.92.36 FACEBOOKUS Ireland 55->173 175 88.218.92.148 ENZUINC-US Netherlands 55->175 119 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 55->119 dropped 121 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 55->121 dropped 74 jfiag3g_gg.exe 55->74         started        76 jfiag3g_gg.exe 55->76         started        78 2 other processes 55->78 177 88.99.66.31 HETZNER-ASDE Germany 57->177 file14 signatures15 process16 dnsIp17 127 C:\Users\user\AppData\...\WinHoster.exe, PE32 59->127 dropped 211 Detected unpacking (changes PE section rights) 59->211 213 Detected unpacking (overwrites its own PE header) 59->213 215 Creates multiple autostart registry keys 59->215 80 WinHoster.exe 59->80         started        217 Injects a PE file into a foreign processes 63->217 147 172.67.188.69 CLOUDFLARENETUS United States 65->147 129 C:\ProgramData\73\vcruntime140.dll, PE32 65->129 dropped 131 C:\ProgramData\73\sqlite3.dll, PE32 65->131 dropped 133 C:\ProgramData\73\softokn3.dll, PE32 65->133 dropped 143 4 other files (none is malicious) 65->143 dropped 82 conhost.exe 68->82         started        84 taskkill.exe 68->84         started        86 timeout.exe 68->86         started        149 198.54.116.159 NAMECHEAP-NETUS United States 70->149 135 C:\...\(_____(_(_________))235 Smeargle.exe, PE32 70->135 dropped 137 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 70->137 dropped 139 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 70->139 dropped 141 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 70->141 dropped 88 (_____(_(_________))235 Smeargle.exe 70->88         started        219 Writes to foreign memory regions 72->219 221 Allocates memory in foreign processes 72->221 223 Creates a thread in another existing process (thread injection) 72->223 file18 signatures19 process20 dnsIp21 161 2.20.142.210 AKAMAI-ASN1EU European Union 88->161 163 162.0.210.44 ACPCA Canada 88->163 165 162.0.220.187 ACPCA Canada 88->165 93 C:\Program Files (x86)\...\Vonasushogy.exe, PE32 88->93 dropped 95 C:\...\Vonasushogy.exe.config, XML 88->95 dropped 97 C:\Users\user\AppData\...\Kyqizhimiwi.exe, PE32 88->97 dropped 99 2 other files (none is malicious) 88->99 dropped 193 Creates multiple autostart registry keys 88->193 file22 signatures23
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-11 06:34:44 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader family:vidar botnet:pub57-1 aspackv2 backdoor discovery evasion infostealer persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Program crash
Checks computer location settings
Drops startup file
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
Checks for common network interception software
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
pupdatastart.store:80
pupdata.online:80
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Unpacked files
SH256 hash:
753b02fff3b6da0de94729ced4e416945ace669005bc824ddf5ba00ba995fbd1
MD5 hash:
2d030aeabd05ee82e02e1a428c80a216
SHA1 hash:
436f7f55a7cd157351db63c8ff549cd24232152f
SH256 hash:
97f886c00d957855ec1c9a0641ebdb4339e82df68d312b7ecb0882f15251bf79
MD5 hash:
5f09d769279b09c11ed1bc10d1e5ba86
SHA1 hash:
c20325eba49cbdff01f582ad0855998ed127a3f3
SH256 hash:
5ad946a22d69f68a1667ceb33c00b3f3179bcc48ba546f5e2490a05dd9b3ee16
MD5 hash:
35e02939b0d54e9482f42e16a00a7985
SHA1 hash:
b3dc4bda6c2fa9e424d96244203b71996ef44b8c
SH256 hash:
c19e52e60705700b386ef007d028edc8ac63d1ceabae38abb3ca004c5f46adfa
MD5 hash:
0c47ee91fede3901a73ff84b1d2f141b
SHA1 hash:
1a326f4ac12d30c89f118868816e830d752acc81
SH256 hash:
3cc795189e78c3aa23ee457566125786e1a4a4b179a8aa71ee672680ee073cc3
MD5 hash:
c6bca7b284ee57b7937a4dd37eda079d
SHA1 hash:
92c11c43312640f4990a4ca8fe24ee746580ce3a
SH256 hash:
74ddd5ec36d476e3b5db93b698e10618ef9767ca94e074ecee6806a7b6af35b2
MD5 hash:
8d2542acf65f4559a58a4beaa3fcad18
SHA1 hash:
68af62e943dbde4f6120a66b06f3b4db656d4bb8
SH256 hash:
7d949047a33a4c10a5e856fb7a019f90ba672aed7d3a8eebf7904253e92a6a9c
MD5 hash:
332fc55d7c5718ef66649be271546061
SHA1 hash:
30b68fb3996a1302ab1d0af4c1980a5544c4e102
Detections:
win_vidar_auto
SH256 hash:
1bb1e726362311c789fdfd464f12e72c279fb3ad639d27338171d16e73360e7c
MD5 hash:
428557b1005fd154585af2e3c721e402
SHA1 hash:
3fc4303735f8355f787f3181d69450423627b5c9
SH256 hash:
664003cbe6a433ee57676929e973a5efe2644429ceeb348323ff70ed93e94d1e
MD5 hash:
890a74f18cc8b987518fe98e44c7b486
SHA1 hash:
af1381401d6ff9a3c7469ffad2fd5838890a4d95
SH256 hash:
3d73de817d29b6dc6f017a07ef9d04036a62a937d48a9e4d2bd63f00ae67d019
MD5 hash:
ca7ce24c812aec952bece56f243ee494
SHA1 hash:
9ca143a3094bf0e6cc3fb284ce3ba87448fc2473
SH256 hash:
f8b282e21b9c17ae48cf9853debce580767f5335eb57a417664e5949e6f9908b
MD5 hash:
f20e6bde1365fdf213fb6b470925c2c2
SHA1 hash:
9bc6796052ee30f4357e59248b358928cfb5d1ea
SH256 hash:
c3014f378d119dce2574c1723e896de931ddc4dc4cc5528e07d33eac95216b15
MD5 hash:
1de301c4711c6db749b32da9c6693805
SHA1 hash:
9380591a5dc8be64c15c42f1d30e0034c50c1179
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
ef83feebe8bed17429c53ecb7b46792be8dc58b81a55ca2b2b16a44c1b57dd2a
MD5 hash:
db45e3a1202c0bf6cd7b153ed3e186d9
SHA1 hash:
5e3e393df8ef796bbca22fe8f25a36df96c920fb
SH256 hash:
f5c706253d17f127d0002617b933a836b1b72370e644a350a6fd2d2e38302ba1
MD5 hash:
d8b90cbbf9903f82c461fc80a0e52fa0
SHA1 hash:
2b5c70e5533f64bfa1006e1a349c958a6ed4363c
SH256 hash:
4022cb2949de0b47b94808edb5160dc2d885a2a482813aa988c941fa76951462
MD5 hash:
febde4e3d0794b567444b6dbafe872fb
SHA1 hash:
14358ff4fc24c579afa8a7f4590ec676857495e0
SH256 hash:
9a280ad5b05977fcda28d50869cee77e343742d01055d1ff165413576994c650
MD5 hash:
f0ec391131da228f695aca7bcfc55355
SHA1 hash:
0a03e31bf5538548850e7c8ef57f95d0df84d1f0
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
36dd3921b1485d621d31f153081eec16ec2cd18eea1f1f3a39dcdc3150aa3d28
MD5 hash:
6b5fe0e640e951c2aa572a91ca9421b5
SHA1 hash:
900a78eaebeae4f6295a14f3dadd1b245a110dc6
SH256 hash:
9a9be6e5b47d31e1f6e32957d214fcebbeeff7c35f4b8319b723e952b0757f25
MD5 hash:
760c04b81990d18feacd440d50697f71
SHA1 hash:
66f9fb3569a16645769b2b09de5af226f6e8e991
SH256 hash:
e63078b405c8fd709e362ba8a74f61e132fdc19d363ff5f984afc3d9dbf5d77a
MD5 hash:
5ebee4a4b030d4048f80de6b949de658
SHA1 hash:
71e461f3f493fc90e2bcbe18617b372ec6a06dbd
SH256 hash:
e0f7d4cd5bed7993b52654afe61049371d9c9b3f19e5a85ec1ead29a08182fc4
MD5 hash:
8a96ca55935f9b5faa5b40c8423d0b81
SHA1 hash:
5e78d14ba5f9053923e801ea6b5b673bd997860b
SH256 hash:
8367e8f5034822a6d4ee6913624f02be48d4455497b07a85dda615839f0ec027
MD5 hash:
908c32a50efe5be10666eb4c4a0c2397
SHA1 hash:
c09685f80650a9dc52bfccddc4fd2f76f85f39f8
SH256 hash:
ada70590a2f4e18dae650ba8e733cb04ad21b67cb553f1c924a409ef86b4b807
MD5 hash:
f0c10d5d985f809d9278b26d3f3103f7
SHA1 hash:
9ed770f697e4468b404c0803880ab89c9cc8f332
SH256 hash:
8122274c5e3ff97f966665ca324d09998f0065f3c086190d6bf095b86085adad
MD5 hash:
894abc4478fb2811a8fbdba808deec54
SHA1 hash:
070b43c807b7c5df66edea55e8dbc09efae6e58e
SH256 hash:
b566e04e4dde55640065fa942fcfa35ec3cb5f0c8b6057bfd0039ac4ebbc65f7
MD5 hash:
b499d366f01242597e6386fcbbbacfb7
SHA1 hash:
f4555ab40925523a3183adb353cde2d80aa5fad8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_smokeloader_a2
Author:pnx
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments