MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc2634e690f84b692d2d804cf29e51a129473631523e7f98dbc774624f666711. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments 1

SHA256 hash: bc2634e690f84b692d2d804cf29e51a129473631523e7f98dbc774624f666711
SHA3-384 hash: 9f8fbeadd27a054fdf2223d3f499155ec42ff6be3af67ec0c287b684efd90cc184e2c580c4c551f40eadbebd49fc0244
SHA1 hash: 7940dab81ba3cd6db9bc3ed61249e92963cc89a8
MD5 hash: 90cea40503bd8098a4ec85ba7405e15f
humanhash: alanine-friend-twelve-golf
File name:90cea40503bd8098a4ec85ba7405e15f
Download: download sample
Signature RaccoonStealer
File size:828'416 bytes
First seen:2021-09-13 10:00:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1f1778a50f9b54ca062656e19d05039f (8 x Glupteba, 3 x RedLineStealer, 2 x RaccoonStealer)
ssdeep 12288:t8uAGTfUuOns9jrKbDDlZoTSwrFm03rTdTp0qFg4YpxwxHaJ0mLz2:t8O8ns5rKbDZAFm0bJTpcg+0m
Threatray 3 similar samples on MalwareBazaar
TLSH T1FD051210BA80E071C24E0E398879D7E6177EF96162A085837BB83B9F5F303F19675796
dhash icon 81bcdcac9c8cb484 (7 x RaccoonStealer, 5 x RedLineStealer, 2 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
90cea40503bd8098a4ec85ba7405e15f
Verdict:
Malicious activity
Analysis date:
2021-09-13 10:01:24 UTC
Tags:
trojan stealer raccoon loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 482079 Sample: xne3TMF2ag.exe Startdate: 13/09/2021 Architecture: WINDOWS Score: 96 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 4 other signatures 2->58 7 xne3TMF2ag.exe 2->7         started        process3 signatures4 60 Contains functionality to steal Internet Explorer form passwords 7->60 10 xne3TMF2ag.exe 80 7->10         started        process5 dnsIp6 46 telete.in 195.201.225.248, 443, 49741 HETZNER-ASDE Germany 10->46 48 5.181.156.77, 49744, 49780, 49785 MIVOCLOUDMD Moldova Republic of 10->48 50 192.168.2.1 unknown unknown 10->50 24 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 10->24 dropped 26 C:\Users\user\AppData\...\vcruntime140.dll, PE32 10->26 dropped 28 C:\Users\user\AppData\...\ucrtbase.dll, PE32 10->28 dropped 30 56 other files (none is malicious) 10->30 dropped 62 Tries to steal Mail credentials (via file access) 10->62 64 Tries to harvest and steal browser information (history, passwords, etc) 10->64 15 WerFault.exe 9 10->15         started        18 WerFault.exe 9 10->18         started        20 WerFault.exe 9 10->20         started        22 5 other processes 10->22 file7 signatures8 process9 file10 32 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 15->32 dropped 34 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 18->34 dropped 36 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 20->36 dropped 38 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 22->38 dropped 40 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 22->40 dropped 42 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 22->42 dropped 44 2 other malicious files 22->44 dropped
Threat name:
Win32.Packed.Generic
Status:
Suspicious
First seen:
2021-09-13 09:25:52 UTC
AV detection:
16 of 44 (36.36%)
Threat level:
  1/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:faf5aed9afbd77616e2fb3d7ebd2fda6413aaaac discovery spyware stealer
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
2c1a4cc71a942c8132231b4ca311a522be49c498eb4ffd3a9dcd5272a041a5a0
MD5 hash:
a1849e6e7f9919e239dbb491fe8f538e
SHA1 hash:
802e3b1fa93dea345ed77878389af2754079db8c
Detections:
win_raccoon_auto
SH256 hash:
0bb7b41ad673d2af4374e596a59cd1c5787c688603ab3f1359b9795bb136884e
MD5 hash:
66156daaef6c1a4973e8ce16e53c2e82
SHA1 hash:
ec68e8cf062ae265ee475f2d0fee62f57d2fc098
SH256 hash:
339403e69b4ce1f2b23b92460610584a771bf57298325426195541dbfda8a6b8
MD5 hash:
646e4a56e25bb92e01a50444728c0e75
SHA1 hash:
e8c398bafc8f03a66b9517ab808d425aed9ab264
SH256 hash:
3e2b76c233470b5740d6ac9326d1b74a2a414fb4cd3f20f7d7c89ed54872baac
MD5 hash:
2dc868af87a7239ae6a15df0dff366ba
SHA1 hash:
abccf918aae93ea734707043d70a46bb26711d20
SH256 hash:
9dc924fd2c943b4d843f83049051f47123fa5eb97a003cc81a69c2a149bbd54e
MD5 hash:
29d7c694d5e49ca42e3f5585722eb055
SHA1 hash:
6941419fce0a87cef45e5b15ebc08d87bc309a96
SH256 hash:
bc2634e690f84b692d2d804cf29e51a129473631523e7f98dbc774624f666711
MD5 hash:
90cea40503bd8098a4ec85ba7405e15f
SHA1 hash:
7940dab81ba3cd6db9bc3ed61249e92963cc89a8
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe bc2634e690f84b692d2d804cf29e51a129473631523e7f98dbc774624f666711

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-13 10:00:23 UTC

url : hxxp://194.145.227.161/dlc/sharing.php?pub=mixnull/