MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c3461cf008e62a6616de0037fd35c54a4d3165a89431dcdb1d431669ca81fa3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: c3461cf008e62a6616de0037fd35c54a4d3165a89431dcdb1d431669ca81fa3d
SHA3-384 hash: 79d642849b49304998bdeace3305b5d33940e06cdd73d3586ab6b663f196989de00a7234769cd76f997813a49f98c48b
SHA1 hash: 120ea9845521f310c3ddc77417cda6aa62839aa7
MD5 hash: 23b012be89b2da9c579f5d36a86ade9b
humanhash: snake-red-beer-pasta
File name:23b012be89b2da9c579f5d36a86ade9b.exe
Download: download sample
Signature RaccoonStealer
File size:607'232 bytes
First seen:2021-10-18 11:16:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b4cda15a674ef12000829b9be50880b2 (2 x RedLineStealer, 2 x Smoke Loader, 1 x Loki)
ssdeep 12288:Ta8vUz8dG6qU7bnM0WUCu0pH1Ga68h+Mk5grfbwh4o+BGFQj:TFUzmWU7bXI1GaP+Ywh4og
Threatray 3'838 similar samples on MalwareBazaar
TLSH T1D6D4C000A651C038F7B252F489BA9669A52E7FE0672460EB53D51AED8734EF0FD3131B
File icon (PE):PE icon
dhash icon 5012b0e068696c46 (8 x RaccoonStealer, 8 x RedLineStealer, 6 x Smoke Loader)
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj
Score:
76 / 100
Signature
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Ulise
Status:
Malicious
First seen:
2021-10-18 11:17:10 UTC
AV detection:
27 of 45 (60.00%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:723d14b565e8f39294f31f86b0ce56cdaee75105 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
c3461cf008e62a6616de0037fd35c54a4d3165a89431dcdb1d431669ca81fa3d
MD5 hash:
23b012be89b2da9c579f5d36a86ade9b
SHA1 hash:
120ea9845521f310c3ddc77417cda6aa62839aa7
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe c3461cf008e62a6616de0037fd35c54a4d3165a89431dcdb1d431669ca81fa3d

(this sample)

  
Delivery method
Distributed via web download

Comments