MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be2d002254d6faabfe84901983be74f44ebde466f955effa74ea990aad6aa59b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 1 File information Comments

SHA256 hash: be2d002254d6faabfe84901983be74f44ebde466f955effa74ea990aad6aa59b
SHA3-384 hash: 896096333ec7e6cd3c5d35396529daaf828a5d926e75ec06cdcd6f70f1f9eaaa8de237629344ca72b62f907373b35aaf
SHA1 hash: e99388a956bfa877b7ce648ecf8f1d9116b62e99
MD5 hash: 635ef412c7ecb2f3ab712a916c7f8395
humanhash: illinois-foxtrot-six-white
File name:BE2D002254D6FAABFE84901983BE74F44EBDE466F955E.exe
Download: download sample
Signature RaccoonStealer
File size:11'484'045 bytes
First seen:2021-08-11 12:05:56 UTC
Last seen:2021-08-11 12:54:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash eb5bc6ff6263b364dfbfb78bdb48ed59 (55 x Adware.Generic, 18 x RaccoonStealer, 8 x Adware.ExtenBro)
ssdeep 196608:5T7valuflJpZifDBtHjbHNbrkU5LNZTGywSnhrzsYxiXYqbY9ePC4aZ:9aluflrsPH5LfcMzszYqbY9em
Threatray 1'926 similar samples on MalwareBazaar
TLSH T13BC62323B385A43ED4A927360573B51018FBF6A9F513BF1676E0C88DCF620C11E7A6A5
dhash icon 62e0e0e3e3ee7830 (1 x RaccoonStealer, 1 x RecordBreaker)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://74.119.195.135/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://74.119.195.135/ https://threatfox.abuse.ch/ioc/171652/

Intelligence


File Origin
# of uploads :
2
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
BE2D002254D6FAABFE84901983BE74F44EBDE466F955E.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-11 12:11:26 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file
Moving a recently created file
Deleting a recently created file
Delayed reading of the file
Launching the process to change network settings
Creating a process with a hidden window
Sending a UDP request
Launching a process
Unauthorized injection to a recently created process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to steal Internet Explorer form passwords
Injects a PE file into a foreign processes
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses whoami command line tool to query computer and username
Yara detected AntiVM3
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 463327 Sample: BE2D002254D6FAABFE84901983B... Startdate: 11/08/2021 Architecture: WINDOWS Score: 64 89 Antivirus detection for dropped file 2->89 91 Antivirus / Scanner detection for submitted sample 2->91 93 Multi AV Scanner detection for dropped file 2->93 95 7 other signatures 2->95 9 BE2D002254D6FAABFE84901983BE74F44EBDE466F955E.exe 2 2->9         started        12 svchost.exe 2->12         started        15 svchost.exe 2->15         started        18 8 other processes 2->18 process3 dnsIp4 65 BE2D002254D6FAABFE...F44EBDE466F955E.tmp, PE32 9->65 dropped 20 BE2D002254D6FAABFE84901983BE74F44EBDE466F955E.tmp 5 14 9->20         started        103 Changes security center settings (notifications, updates, antivirus, firewall) 12->103 81 8.8.8.8 GOOGLEUS United States 15->81 83 23.211.4.86 AKAMAI-ASUS United States 15->83 85 127.0.0.1 unknown unknown 15->85 87 192.168.2.1 unknown unknown 18->87 file5 signatures6 process7 file8 49 Internet.Download....v6.38.18.exe (copy), PE32 20->49 dropped 51 C:\...\is-0AM4F.tmp, PE32 20->51 dropped 53 C:\...\aFCDKiW1DOxXjGm.exe (copy), PE32 20->53 dropped 55 2 other files (none is malicious) 20->55 dropped 23 Internet.Download.Manager.v6.38.18.exe 18 240 20->23         started        28 aFCDKiW1DOxXjGm.exe 3 20->28         started        process9 dnsIp10 73 5.45.205.221 YANDEXRU Russian Federation 23->73 75 5.45.205.244 YANDEXRU Russian Federation 23->75 77 3 other IPs or domains 23->77 57 C:\Program Files (x86)\...\idmwfp64.sys, PE32+ 23->57 dropped 59 C:\Program Files (x86)\...\idmwfp32.sys, PE32 23->59 dropped 61 C:\Program Files (x86)\...\idmtdi64.sys, PE32+ 23->61 dropped 63 50 other files (1 malicious) 23->63 dropped 97 Sample is not signed and drops a device driver 23->97 30 cmd.exe 23->30         started        33 netsh.exe 3 23->33         started        36 ROUTE.EXE 1 23->36         started        99 Contains functionality to steal Internet Explorer form passwords 28->99 101 Injects a PE file into a foreign processes 28->101 38 aFCDKiW1DOxXjGm.exe 28->38         started        file11 signatures12 process13 dnsIp14 105 Uses cmd line tools excessively to alter registry or file data 30->105 107 Uses whoami command line tool to query computer and username 30->107 40 conhost.exe 30->40         started        67 95.141.193.133 ALTURA-ASRU Russian Federation 33->67 42 conhost.exe 33->42         started        44 conhost.exe 36->44         started        69 74.119.195.135 MOVECLICKLLCUS United States 38->69 71 195.201.225.248 HETZNER-ASDE Germany 38->71 46 WerFault.exe 38->46         started        signatures15 process16 dnsIp17 79 20.42.65.92 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 46->79
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-04-13 15:13:33 UTC
AV detection:
17 of 27 (62.96%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:e2b58b2c24d80fcfd249021c5a21ac97c09e40a1 evasion stealer upx
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
ACProtect 1.3x - 1.4x DLL software
Raccoon
Raccoon Stealer Payload
Unpacked files
SH256 hash:
c7e76f2283b56690baa74441b0d1478bdf3d634ced21eba512d392542b9a566d
MD5 hash:
2824e7ba7b72920c22704135196290ae
SHA1 hash:
179a5cc3d8145c83afc4721136fb558aabf25d6a
SH256 hash:
5e0f3da625a479a5e7e807b5f09c889d95474139410b312ba3a39bcb05976729
MD5 hash:
3d20c2ea9ac04e1707f853bb1780bc18
SHA1 hash:
805e90b023eb92d44bbe11daefce6edbe872cb74
SH256 hash:
a820a32e5ce89e3e336afc71aa1bf42a357ec542c2bc6e50c6255c1333812587
MD5 hash:
b7d0d765c151d235165823b48554e442
SHA1 hash:
fe530e6c6fd60392d4ce611b21ec9daad3f1bc84
SH256 hash:
4192ba66cbc5f20c7b80fba5b8783b3951d0df66974f1feb8111fd2444f7456f
MD5 hash:
d80093adbec6af3e50e6b3e3c53dada6
SHA1 hash:
e245840e814f0127a37e1642046ef145519e566a
SH256 hash:
e9e140908cd514b2ebf88ecb071a845f4d00afdc9e6abdba186d3ed93d5e74e2
MD5 hash:
088c48d3ea0d585a813cc89470fb1972
SHA1 hash:
df6a9c70ff29f130373ed7ecd11f0fdb060a9850
SH256 hash:
0ab71106a79f4f5bdf57c13f8c3a95a4a3e779da4cf75bf550b977ef7955a5db
MD5 hash:
9bf17981c3cd7e4e61951c9c2a7696e8
SHA1 hash:
c4fca63c8f7b6da29e1b03cca6a8ffd52f0e4cf2
SH256 hash:
f23cb55591027469ca4a1f220fcea82d1fa634dd681b802d1c1fb63a1a3fdf02
MD5 hash:
024b1252cdfb738f3269b8d0caa36a38
SHA1 hash:
be668109b1674db77526d87383d7419ba78fadd3
SH256 hash:
1c5edab4c7bb5d7c3c56463b449d99c00edb4ce5343ac77232b922026d1778ed
MD5 hash:
d7c1137f3a238e019b75f99175ee6dc4
SHA1 hash:
b2a22cf35ba8067c1b551f43728c153916b62465
SH256 hash:
30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
MD5 hash:
f0438a894f3a7e01a4aae8d1b5dd0289
SHA1 hash:
b058e3fcfb7b550041da16bf10d8837024c38bf6
SH256 hash:
2a6291003f1cc02fbac8fe0ec587985f2bfa9792ba8acaa38f4bc70fe6816170
MD5 hash:
71d504c05dd27e8e4862d7cbe4a2f7cd
SHA1 hash:
a68ad397cb7a0bd5f42b4e18d62e2f38535c6542
SH256 hash:
9f6bbc0b32471b7502eb4e31088c47894787cae7afd00ef397f4c070db0ef999
MD5 hash:
8b659739e6f1360ef885a63f74e8e2c8
SHA1 hash:
a45d46e53fbdb5e03d97d186f091430039ef7176
SH256 hash:
1672d02debd395abb88acde3a5194aa1e4cf6260f304887a806a481b1da6def6
MD5 hash:
daaefad1b8c9b2c6788385a9d49ff43a
SHA1 hash:
a2efb27f4ebb81a5a0680c4e2d65fbae2859c2d3
SH256 hash:
f8e10901d8b867d965b8672b2261330bc5959a090dfef63ad30d28ee82d50a8f
MD5 hash:
aa226e4fc52645f8933d0f1b511c3d11
SHA1 hash:
9eef19d0ede87179db8dc76413e553a92559add2
SH256 hash:
20e642707ef82852bcf153254cb94b629b93ee89a8e8a03f838eef6cbb493319
MD5 hash:
109b201717ab5ef9b5628a9f3efef36f
SHA1 hash:
98db1f0cc5f110438a02015b722778af84d50ea7
SH256 hash:
c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
MD5 hash:
640bff73a5f8e37b202d911e4749b2e9
SHA1 hash:
9588dd7561ab7de3bca392b084bec91f3521c879
SH256 hash:
6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
MD5 hash:
8cf2ac271d7679b1d68eefc1ae0c5618
SHA1 hash:
7cc1caaa747ee16dc894a600a4256f64fa65a9b8
SH256 hash:
e4cdb8bc240fbadd9dc36f5011c3a85cceaba1ff7ac1d9bed004a3f43ffc352b
MD5 hash:
18db386d508be3fb428290fe503e1c03
SHA1 hash:
74bcf8ef5fe5a00c631f10db83ec51dc9c6d4b82
SH256 hash:
d980d9c64576a9327bf0b4e4cdd5d37268ccc227dfe48a14964ea43f6e2fc5e3
MD5 hash:
5e97ca8bbbc9304f9545b54ff4846b74
SHA1 hash:
687cfaa02386ec7ec148f88347e37da3f9de686d
SH256 hash:
c5ba017732597a82f695b084d1aa7fe3b356168cc66105b9392a9c5b06be5188
MD5 hash:
ec9640b70e07141febbe2cd4cc42510f
SHA1 hash:
64a5e4b90e5fe62aa40e7ac9e16342ed066f0306
SH256 hash:
66ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b
MD5 hash:
c6a070b3e68b292bb0efc9b26e85e9cc
SHA1 hash:
5a922b96eda6595a68fd0a9051236162ff2e2ada
SH256 hash:
17346ffaefb8a36c3abd2c7081691215704bd8ad5bcdc885b9d75b597e215c00
MD5 hash:
7a4a6a950cb2cc9f9d21c85088c2adb6
SHA1 hash:
5326766f2b07d15d541b3c6d956b871f4e3e6010
SH256 hash:
92769e02b7fd474a1df145ab0b46de98de4bd0c1af4a9f0dcd8d7d672f16310d
MD5 hash:
38e848b6d64289f3b20ef2b705eb2578
SHA1 hash:
3025f9de240014699cb527dc68bde0672e7c84ea
SH256 hash:
ec40e745386fbe4775c9785dafe9033a5e2eda8504aa08aa8c195ba0020eb314
MD5 hash:
24398e5878ed29401af934624fc58f2c
SHA1 hash:
2aeea97f61833b2ab86cbdef30267f9d55749e9a
SH256 hash:
10be4ac93ab6766519312089dd398a949030a803b02fc16e815106b373d53dc9
MD5 hash:
2cefe0a6e6d6ad3dd40f498dfe6ce0cc
SHA1 hash:
272651c4a7fc75f948653612df20b43d3ac116bb
Detections:
win_oski_g0
SH256 hash:
b76e5d4d0eb93f7e9f4b8c4a068c88b06150fc065cf150b962681b1825dced7c
MD5 hash:
9646fce84dc3be67def77da427e69a4d
SHA1 hash:
1182a2171be326cf99948c5088422d802d80a1dc
SH256 hash:
b91ee87ec45b648453b4001d51512da936acbbcd6b9e09cb4edd02697094fb3a
MD5 hash:
e25e6dfdd1bae389d76d97aac3b6e961
SHA1 hash:
0e12224c405934e27e657858af7ca8a375a424e3
SH256 hash:
e40e55ad79b103110c2d88b58b8ea9ea1113e8f3b576947d276b21064bc1cbfa
MD5 hash:
c64db7de808f1a61fea367e63a039f92
SHA1 hash:
03dfd8b687fe8624e45481d95e9a21b437cf91e1
SH256 hash:
0a70cc4b93d87ecd93e538cfbed7c9a4b8b5c6f1042c6069757bda0d1279ed06
MD5 hash:
55a723e125afbc9b3a41d46f41749068
SHA1 hash:
01618b26fec6b8c6bdb866e6e4d0f7a0529fe97c
SH256 hash:
2ff22d7f9f8fe2bf8db72d05cf1dc51cb678614f3aa49a1508e83bf53f498bf1
MD5 hash:
1c0dfbe98e170d93d61c96aa69181b59
SHA1 hash:
904ac8efe1178bd2c31bfc9524f8354e5508f193
SH256 hash:
127d023850a9569272d2bb02d2967432ac0c79eae5fd87ce21cde2c72537b2e6
MD5 hash:
e7a5edf16b19f39747b94be7b38dbc5d
SHA1 hash:
f72b798e4a0d698e664b00dae3bf14f3d40ec5f2
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
c9b8f68f7cac0076d053bdea531050558d5c53cc4474b16e7c0fd346e4554167
MD5 hash:
62676e370ab8f9725346c867b3a3b09f
SHA1 hash:
87cab93db852c5469d1288a2b188894c280f03a8
SH256 hash:
f344713a08459675b6db6fc79e93f7813d8793af6fd9a2c8c64aa1a0a0e0d218
MD5 hash:
d53c32cedd3d4c37d0a35183ec531ed9
SHA1 hash:
1184372024a780df8234ac67c4a5db4d303adbc5
SH256 hash:
be2d002254d6faabfe84901983be74f44ebde466f955effa74ea990aad6aa59b
MD5 hash:
635ef412c7ecb2f3ab712a916c7f8395
SHA1 hash:
e99388a956bfa877b7ce648ecf8f1d9116b62e99
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:quakbot_halo_generated
Author:Halogen Generated Rule, Corsin Camichel

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments