MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c3c2a6747a34c92023bef1d5abc604f697408e60ee64d1155af7a8c62727e894. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: c3c2a6747a34c92023bef1d5abc604f697408e60ee64d1155af7a8c62727e894
SHA3-384 hash: 273382efc25d2a3fdcda91ac40b347093a84a5370ad6d2a25a8c7c55ce5a4c60a9c2fdcb0f881c261e0db88f99d7df50
SHA1 hash: a9a2f97a46fcd667ffd21f9ff3091f7d53db01b3
MD5 hash: 806934432d6829ff5a0277ec0d4e3e36
humanhash: lactose-chicken-lemon-salami
File name:806934432d6829ff5a0277ec0d4e3e36.exe
Download: download sample
Signature RaccoonStealer
File size:1'433'600 bytes
First seen:2020-10-14 14:45:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c527ec4fd7e542f708e9a6ac42ef3593 (5 x RaccoonStealer)
ssdeep 24576:Os50MGAjJdvzf+tdrjg35C3EP7xs50MvDwiir6tus50MbzxZoMIrYtprntF:Os5G6ktpM3bs5vDw1Kus5bVeM9tF
Threatray 843 similar samples on MalwareBazaar
TLSH 386522229E675223F40A9DB08FE053D44BBD6D637246AC1FFB8C161B07E294A54C5BB3
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
DNS request
Sending a custom TCP request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Connection attempt to an infection source
Result
Threat name:
AsyncRAT Azorult Raccoon Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Sigma detected: Executable Used by PlugX in Uncommon Location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Keylogger Generic
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 298013 Sample: VQOdQ2zoWa.exe Startdate: 14/10/2020 Architecture: WINDOWS Score: 100 90 agentpurple.ac.ug 2->90 92 agentpapple.ac.ug 2->92 94 2 other IPs or domains 2->94 118 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->118 120 Malicious sample detected (through community Yara rule) 2->120 122 Antivirus detection for URL or domain 2->122 124 14 other signatures 2->124 11 VQOdQ2zoWa.exe 16 2->11         started        signatures3 process4 file5 82 C:\Users\user\AppData\...82hrdgfertqw.exe, PE32 11->82 dropped 84 C:\Users\user\AppData\...behaviorgraphFsdfgytrqwe.exe, PE32 11->84 dropped 138 Detected unpacking (changes PE section rights) 11->138 140 Detected unpacking (overwrites its own PE header) 11->140 142 Maps a DLL or memory area into another process 11->142 15 Nhrdgfertqw.exe 4 11->15         started        18 GFsdfgytrqwe.exe 4 11->18         started        20 VQOdQ2zoWa.exe 24 11->20         started        signatures6 process7 dnsIp8 144 Detected unpacking (changes PE section rights) 15->144 146 Maps a DLL or memory area into another process 15->146 24 Nhrdgfertqw.exe 71 15->24         started        148 Detected unpacking (overwrites its own PE header) 18->148 29 GFsdfgytrqwe.exe 188 18->29         started        96 trqqwsad.site 101.32.183.30, 443, 49725, 49727 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 20->96 98 telete.in 195.201.225.248, 443, 49724 HETZNER-ASDE Germany 20->98 62 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 20->62 dropped 64 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 20->64 dropped 150 Tries to steal Mail credentials (via file access) 20->150 152 Tries to harvest and steal browser information (history, passwords, etc) 20->152 file9 signatures10 process11 dnsIp12 100 jamesrlongacre.ac.ug 217.8.117.77, 49723, 49726, 49732 CREXFEXPEX-RUSSIARU Russian Federation 24->100 66 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 24->66 dropped 68 C:\Users\user\AppData\Local\Temp\ds2.exe, PE32 24->68 dropped 70 C:\Users\user\AppData\Local\Temp\ds1.exe, PE32 24->70 dropped 78 49 other files (1 malicious) 24->78 dropped 126 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->126 128 Tries to steal Instant Messenger accounts or passwords 24->128 130 Tries to steal Mail credentials (via file access) 24->130 136 2 other signatures 24->136 31 ac.exe 24->31         started        35 ds1.exe 24->35         started        37 ds2.exe 24->37         started        41 2 other processes 24->41 102 jamesrlon.ug 29->102 72 C:\ProgramData\vcruntime140.dll, PE32 29->72 dropped 74 C:\ProgramData\sqlite3.dll, PE32 29->74 dropped 76 C:\ProgramData\softokn3.dll, PE32 29->76 dropped 80 4 other files (none is malicious) 29->80 dropped 132 Tries to harvest and steal browser information (history, passwords, etc) 29->132 134 Tries to steal Crypto Currency Wallets 29->134 39 cmd.exe 29->39         started        file13 signatures14 process15 dnsIp16 88 C:\Users\user\AppData\Roaming\...\ddcvlc.exe, PE32 31->88 dropped 110 Creates an undocumented autostart registry key 31->110 112 Adds a directory exclusion to Windows Defender 31->112 114 Injects a PE file into a foreign processes 31->114 44 ds1.exe 35->44         started        47 ds2.exe 37->47         started        50 conhost.exe 39->50         started        52 taskkill.exe 39->52         started        104 cdn.discordapp.com 162.159.134.233, 443, 49746 CLOUDFLARENETUS United States 41->104 106 discord.com 162.159.137.232, 443, 49744, 49745 CLOUDFLARENETUS United States 41->106 116 Creates a thread in another existing process (thread injection) 41->116 54 conhost.exe 41->54         started        56 timeout.exe 41->56         started        file17 signatures18 process19 dnsIp20 86 C:\Windows\Temp\deyu0qjz.exe, PE32 44->86 dropped 58 cmstp.exe 44->58         started        108 192.168.2.1 unknown unknown 47->108 60 powershell.exe 47->60         started        file21 process22
Threat name:
Win32.Infostealer.Azorult
Status:
Malicious
First seen:
2020-10-14 07:20:24 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
rat evasion trojan family:asyncrat infostealer family:azorult family:oski discovery spyware family:modiloader
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Drops desktop.ini file(s)
JavaScript code in executable
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
Async RAT payload
ModiLoader First Stage
AsyncRat
Azorult
Contains code to disable Windows Defender
ModiLoader, DBatLoader
Modifies Windows Defender Real-time Protection settings
Oski
Malware Config
C2 Extraction:
agentttt.ac.ug,agentpurple.ac.ug:6970
Unpacked files
SH256 hash:
2c6a683ae60a481cfef31d949855d1b7999cfe53faa3ec89ef4d61eb3c97e894
MD5 hash:
52236f3df0f9ac7e65fa66ea5b7d59af
SHA1 hash:
778ff0be3da361e42560d43c5c42a977afb65b62
SH256 hash:
e9fda35933d8f4fd28b3b25b76eadde8c679b831458850c02896cb993440a865
MD5 hash:
ef0f41c5ab06b5462217f9c6b3255f66
SHA1 hash:
de30f7ae5071ef3ce89ab53b2099485c49a855ec
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
7631e1dd55d887e70537ff3972c70504d06e07d97ff7f360d0d233007684ce67
MD5 hash:
f7ddb2546c7c9421857194cfe9b457b9
SHA1 hash:
acb08441225ff9ab389fcdd963f2426d7f2c062c
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
488ea358ad592518f04401753d4321eca110ad14d2f605d33087eab1089e179a
MD5 hash:
96e3d7e20b092c4c7bd5f9971794efac
SHA1 hash:
d7566783c40ee283df94223156bd5004d4bfc893
Detections:
win_raccoon_a0 win_raccoon_auto
SH256 hash:
c3c2a6747a34c92023bef1d5abc604f697408e60ee64d1155af7a8c62727e894
MD5 hash:
806934432d6829ff5a0277ec0d4e3e36
SHA1 hash:
a9a2f97a46fcd667ffd21f9ff3091f7d53db01b3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_oski_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_a0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe c3c2a6747a34c92023bef1d5abc604f697408e60ee64d1155af7a8c62727e894

(this sample)

Comments