MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c21002370700932f744db40abd356df44e0a665459f20fa62b7703b865c48318. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 4 File information Comments

SHA256 hash: c21002370700932f744db40abd356df44e0a665459f20fa62b7703b865c48318
SHA3-384 hash: 3aff35b3911d32d183933e991dda24509fa3c601a1459f61403d4d32d7ba1e9439e74c817ee4c1459c76e94b0f97dd6f
SHA1 hash: 2aa8fe1cc8f52ab832a2d7968d0225ed66d5eb74
MD5 hash: c71f9ec503276829fe3d699f8a7d207b
humanhash: helium-music-lactose-texas
File name:C71F9EC503276829FE3D699F8A7D207B.exe
Download: download sample
Signature RaccoonStealer
File size:3'501'110 bytes
First seen:2021-07-12 19:30:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 98304:UbyX1zqyFxim6ATdA8xdVsvk3upL/dSWtcUe:UOXvxH6ATdA81svkuL0F
Threatray 1'190 similar samples on MalwareBazaar
TLSH T18EF533417A8196B1D5361D354A75AB11A93C7C200F348BEFA3F4255DDA3A1C2EF32BA3
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
45.140.147.193:35789

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.140.147.193:35789 https://threatfox.abuse.ch/ioc/159762/

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C71F9EC503276829FE3D699F8A7D207B.exe
Verdict:
Malicious activity
Analysis date:
2021-07-12 19:36:47 UTC
Tags:
evasion autoit trojan stealer vidar loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba Raccoon RedLine SmokeLoader Soc
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Sigma detected: Execution from Suspicious Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Glupteba
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 447533 Sample: 8lV4yAlU6o.exe Startdate: 12/07/2021 Architecture: WINDOWS Score: 100 89 176.113.115.136 SELECTELRU Russian Federation 2->89 91 google.vrthcobj.com 2->91 93 4 other IPs or domains 2->93 131 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->131 133 Found malware configuration 2->133 135 Antivirus detection for URL or domain 2->135 137 17 other signatures 2->137 9 8lV4yAlU6o.exe 1 13 2->9         started        12 iexplore.exe 2 88 2->12         started        signatures3 process4 file5 49 C:\Users\user\Desktop\pub2.exe, PE32 9->49 dropped 51 C:\Users\user\Desktop\jg3_3uag.exe, PE32 9->51 dropped 53 C:\Users\user\Desktop\Installation.exe, PE32 9->53 dropped 55 4 other files (2 malicious) 9->55 dropped 14 Info.exe 9->14         started        19 Files.exe 10 9->19         started        21 pub2.exe 9->21         started        25 4 other processes 9->25 23 iexplore.exe 38 12->23         started        process6 dnsIp7 101 www.anderesitebrauchen.com 14->101 103 www.jinhuamz.com 103.155.92.207, 49747, 80 TWIDC-AS-APTWIDCLimitedHK unknown 14->103 111 13 other IPs or domains 14->111 75 C:\Users\...\yTGzCqka9ZeCSepUXUsun7d1.exe, PE32 14->75 dropped 77 C:\Users\...\w9tol9zOtzppM5WXeBVebcZG.exe, PE32 14->77 dropped 79 C:\Users\...\o1nRPb53iCQtzqd7pUZOhrwn.exe, PE32 14->79 dropped 87 37 other files (28 malicious) 14->87 dropped 115 Drops PE files to the document folder of the user 14->115 117 Performs DNS queries to domains with low reputation 14->117 119 Disable Windows Defender real time protection (registry) 14->119 81 C:\Users\user\AppData\Local\Temp\...\File.exe, PE32 19->81 dropped 27 File.exe 3 20 19->27         started        83 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 21->83 dropped 121 DLL reload attack detected 21->121 123 Renames NTDLL to bypass HIPS 21->123 125 Checks if the current machine is a virtual machine (disk enumeration) 21->125 32 explorer.exe 21->32 injected 105 2no.co 88.99.66.31, 443, 49733, 49734 HETZNER-ASDE Germany 23->105 107 iplogger.org 23->107 109 101.36.107.74, 49736, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 25->109 113 4 other IPs or domains 25->113 85 C:\Users\user\Documents\...\jg3_3uag.exe, PE32 25->85 dropped 127 Tries to harvest and steal browser information (history, passwords, etc) 25->127 129 Creates processes via WMI 25->129 34 Folder.exe 25->34         started        36 conhost.exe 25->36         started        38 WerFault.exe 25->38         started        file8 signatures9 process10 dnsIp11 99 newja.webtm.ru 92.53.96.150, 49732, 80 TIMEWEB-ASRU Russian Federation 27->99 65 C:\Users\Public\run2.exe, PE32 27->65 dropped 67 C:\Users\Public\run.exe, PE32 27->67 dropped 147 Binary is likely a compiled AutoIt script file 27->147 149 Drops PE files to the user root directory 27->149 40 run2.exe 27->40         started        45 run.exe 27->45         started        69 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 34->69 dropped 71 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 34->71 dropped 73 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 34->73 dropped 47 conhost.exe 34->47         started        file12 signatures13 process14 dnsIp15 95 sergeevih43.tumblr.com 74.114.154.18, 443, 49794 AUTOMATTICUS Canada 40->95 97 162.55.223.232 ACPCA United States 40->97 57 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 40->57 dropped 59 C:\Users\user\AppData\...\mozglue[1].dll, PE32 40->59 dropped 61 C:\Users\user\AppData\...\freebl3[1].dll, PE32 40->61 dropped 63 9 other files (none is malicious) 40->63 dropped 139 Multi AV Scanner detection for dropped file 40->139 141 Detected unpacking (changes PE section rights) 40->141 143 Detected unpacking (overwrites its own PE header) 40->143 145 4 other signatures 40->145 file16 signatures17
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2021-07-10 01:47:58 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:socelars family:vidar botnet:20k botnet:865 botnet:890 botnet:903 botnet:9_7_r botnet:sel10 backdoor dropper evasion infostealer loader stealer themida trojan vmprotect
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
autoit_exe
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
45.140.147.193:35789
xtarweanda.xyz:80
kathonaror.xyz:80
https://sergeevih43.tumblr.com/
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Unpacked files
SH256 hash:
fa8e9649c3ea2415dd1da245b280766263f1344fe8a980944e30fdd4e159bf33
MD5 hash:
155ba44ad55ed22b1b377b42b1928ff6
SHA1 hash:
c5432f0bbb9e6703b8dc490132975c02ba77b203
SH256 hash:
f78cafdf504a8dbc642063f10fad6604919bebbb457621acf9fd12cd9cb8a8d2
MD5 hash:
546ec8e29b9563c6b5f31ebda05dab92
SHA1 hash:
b21d335a6e4468dc57eb3a4368019788b1b4489b
SH256 hash:
ef741c122ea840d444c718852b75da0b27f202e1d8bc0d08fb2227c7d3065ab4
MD5 hash:
b6e0ef10bbdbfc8646c9ffe5e079aa5c
SHA1 hash:
01ec8b37b9a82f31aebe54decf0e926640d302c2
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
35dca40b7b4591c3fe4140c7f6f220c4aa55d0c05d21c621866d2be21c325cbf
MD5 hash:
7b89331c054b7482453d089c5dd0fa04
SHA1 hash:
4b3a14abf378c093adb6c68ace05688b9a8304ce
SH256 hash:
67cdc7c5de5e46229adc831dc6fd3053d996ecf02e94706b6b6ae1b0ed976f2c
MD5 hash:
555b5b60b2dcc53e71e6d9ba8302c4b9
SHA1 hash:
550326b1226629a867d4606ad0c98c4ef9596b47
SH256 hash:
3e62ffd46bb97dad1c9542d7c310fd76307934b38a4ade5d4100cd00aaffa880
MD5 hash:
1098fd963a65a47d1e9da0e0768ee83c
SHA1 hash:
f107d50e8bd9e94f902a46d429a088379f236e83
SH256 hash:
6b434eec9ffd54e88b45998011fddf5cb8d145fad65bd65ee82d01cf522d461f
MD5 hash:
bc2b0051f65000a7bc102f91d76115d4
SHA1 hash:
35f763ab8f20b38234c86345cc0469ceab5ea5ad
Detections:
win_socelars_auto
SH256 hash:
0e119dbbc41ef4f55f49ef9c5d1c865d5d11073357f0959d3548e93dbb1f8157
MD5 hash:
f09d6eeee8b597062a5bc189796cf29c
SHA1 hash:
2e650170a4cc09d55da929e1a741cce73b10f191
SH256 hash:
332a3d08e133a06502fa2612a2445ecc7bd0e2075e71a69fa3e649da829fc6cd
MD5 hash:
fad523717071275d81efdde831f954da
SHA1 hash:
3b4ad3d8c8168ccbc9ec7dfbe9960d8b109551c4
SH256 hash:
41fd854217715c1464c719646a2fd9094cafe562313cb8e46a46db6d9af4f3df
MD5 hash:
6e03c18a2b5fbd43a67c5ebb2fe8a62c
SHA1 hash:
b0cbc69b8764d3516b0bdd0964a82d65d8728a70
SH256 hash:
c21002370700932f744db40abd356df44e0a665459f20fa62b7703b865c48318
MD5 hash:
c71f9ec503276829fe3d699f8a7d207b
SHA1 hash:
2aa8fe1cc8f52ab832a2d7968d0225ed66d5eb74
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments