MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c39778737ab289b8253a0c33f9fb9a0fd23492d2a0679d1759180b93ce110899. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: c39778737ab289b8253a0c33f9fb9a0fd23492d2a0679d1759180b93ce110899
SHA3-384 hash: c4e7ccf9cca035b6b8a945a520f9cc3c391d55f412db3997fdf54c5b8a815e2d6eecf962956eaf5cfa1720890d70c1ba
SHA1 hash: d018af4f99d9385de24214cecc0632a4f1aa0ebc
MD5 hash: 8e59ca175fec51b753f178d488291ca3
humanhash: oranges-quiet-venus-nebraska
File name:8E59CA175FEC51B753F178D488291CA3.exe
Download: download sample
Signature RaccoonStealer
File size:1'193'861 bytes
First seen:2021-07-08 13:26:18 UTC
Last seen:2021-07-08 13:48:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 41999ec9d2bb54af1616c904a0650895 (1 x DarkComet, 1 x AsyncRAT, 1 x RaccoonStealer)
ssdeep 24576:QQQ66X+aQ7wbGJ0wvgp2ksCsd39JKixu4J/SxXxxIHH485g04CaW/cKl6iqNV3:O66X+aEunXxxInZlHHc2/eV3
Threatray 917 similar samples on MalwareBazaar
TLSH T15B45CF23E390A149D45680B058AAE6B97A192C781441AE47F3C0BF4F35B26E3F7B571F
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://34.89.184.90/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://34.89.184.90/ https://threatfox.abuse.ch/ioc/158448/

Intelligence


File Origin
# of uploads :
2
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8E59CA175FEC51B753F178D488291CA3.exe
Verdict:
Malicious activity
Analysis date:
2021-07-08 13:28:04 UTC
Tags:
trojan stealer raccoon loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
AsyncRAT BitRAT Raccoon Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Found malware configuration
Hides threads from debuggers
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected AsyncRAT
Yara detected BitRAT
Yara detected Raccoon Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 445911 Sample: aY5UWK4jxg.exe Startdate: 08/07/2021 Architecture: WINDOWS Score: 100 55 maidright.chickenkiller.com 2->55 69 Multi AV Scanner detection for domain / URL 2->69 71 Found malware configuration 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 7 other signatures 2->75 9 aY5UWK4jxg.exe 2->9         started        signatures3 process4 process5 11 RegSvcs.exe 108 9->11         started        16 WerFault.exe 23 9 9->16         started        dnsIp6 59 telete.in 195.201.225.248, 443, 49720 HETZNER-ASDE Germany 11->59 61 34.89.184.90, 49722, 80 GOOGLEUS United States 11->61 63 bravestone.ru 172.67.175.80, 443, 49729 CLOUDFLARENETUS United States 11->63 45 C:\Users\user\AppData\...\95W3M9QMLc.exe, PE32 11->45 dropped 47 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 11->47 dropped 49 C:\Users\user\AppData\LocalLow\...\nss3.dll, PE32 11->49 dropped 53 58 other files (1 malicious) 11->53 dropped 81 Tries to steal Mail credentials (via file access) 11->81 83 Tries to harvest and steal browser information (history, passwords, etc) 11->83 85 DLL side loading technique detected 11->85 18 vqfWSvAGfP.exe 14 288 11->18         started        22 95W3M9QMLc.exe 11->22         started        25 cmd.exe 1 11->25         started        51 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->51 dropped file7 signatures8 process9 dnsIp10 57 192.168.2.1 unknown unknown 18->57 37 C:\Users\user\AppData\...\editorpro.exe, PE32 18->37 dropped 39 C:\Users\user\AppData\...\tsharkdecode.dll, PE32+ 18->39 dropped 41 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32+ 18->41 dropped 43 12 other files (none is malicious) 18->43 dropped 27 editorpro.exe 18->27         started        77 Sample uses process hollowing technique 22->77 31 vbc.exe 2 22->31         started        33 conhost.exe 25->33         started        35 timeout.exe 1 25->35         started        file11 signatures12 process13 dnsIp14 65 185.157.162.75 OBE-EUROPEObenetworkEuropeSE Sweden 27->65 79 Hides threads from debuggers 27->79 67 maidright.chickenkiller.com 45.83.220.209 ESAB-ASSE Sweden 31->67 signatures15
Threat name:
Win32.Trojan.Johnnie
Status:
Malicious
First seen:
2021-07-06 21:50:00 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:asyncrat family:raccoon botnet:e769a3b57d823e6577700a58ab4a4a547b9f01be discovery rat stealer
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
Async RAT payload
AsyncRat
Raccoon
Malware Config
C2 Extraction:
maidright.chickenkiller.com:54856
Unpacked files
SH256 hash:
758b0fcad0950b63607f06609bc9ffd7953206111f04adfbf40bfc1c0b5ed2c0
MD5 hash:
dfd72cf998be69be0418701a0dee0272
SHA1 hash:
16ec42de83a698415daa33b47a5363fb289a4f6f
Detections:
win_raccoon_auto
SH256 hash:
c39778737ab289b8253a0c33f9fb9a0fd23492d2a0679d1759180b93ce110899
MD5 hash:
8e59ca175fec51b753f178d488291ca3
SHA1 hash:
d018af4f99d9385de24214cecc0632a4f1aa0ebc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments