MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c54228f797eb663e6a223ecf20f225f91bc2e1dfbea5ac84687ff87513a0dad5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 5 File information Comments

SHA256 hash: c54228f797eb663e6a223ecf20f225f91bc2e1dfbea5ac84687ff87513a0dad5
SHA3-384 hash: 12196946e5b468c38e133052fdcbfe7f1e12ad1265afbdc5bdb40c74bf6a08b56c79cbe81b24fb493b31200853bb760e
SHA1 hash: 51c13a1ce196ac6626ab644fb6b900ec3db913e5
MD5 hash: e9a21ecbb9dd174fab29f35bc830427f
humanhash: london-quiet-steak-chicken
File name:E9A21ECBB9DD174FAB29F35BC830427F.exe
Download: download sample
Signature RaccoonStealer
File size:685'064 bytes
First seen:2021-06-27 13:45:34 UTC
Last seen:2021-07-12 08:07:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d2062601d6f58bcd4b341aac7218fb3d (1 x RaccoonStealer)
ssdeep 12288:oANtD/+GziyXRXi0JMOfKSRdIwcYc7G+yAdtkfX414NjBiPs:owVZOyXtJMOLvW79dQpjBiPs
Threatray 1'631 similar samples on MalwareBazaar
TLSH 77E423216602D037D6AAA6714584D322267FB97363B284CF3A20437DDD727E12EB4B77
Reporter abuse_ch
Tags:exe OOO Diamartis RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://35.246.76.29/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://35.246.76.29/ https://threatfox.abuse.ch/ioc/154454/

Intelligence


File Origin
# of uploads :
3
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
E9A21ECBB9DD174FAB29F35BC830427F.exe
Verdict:
Malicious activity
Analysis date:
2021-06-27 13:47:32 UTC
Tags:
trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found malware configuration
Hijacks the control flow in another process
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 440963 Sample: vTRE53Aj3Z.exe Startdate: 27/06/2021 Architecture: WINDOWS Score: 100 40 ipv4.imgur.map.fastly.net 2->40 42 i.imgur.com 2->42 44 eth0.me 2->44 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Multi AV Scanner detection for domain / URL 2->56 58 Found malware configuration 2->58 60 4 other signatures 2->60 9 vTRE53Aj3Z.exe 82 2->9         started        signatures3 process4 dnsIp5 46 telete.in 195.201.225.248, 443, 49722 HETZNER-ASDE Germany 9->46 48 35.246.76.29, 49723, 80 GOOGLEUS United States 9->48 50 forexcaptain.info 104.21.70.173, 443, 49732, 49733 CLOUDFLARENETUS United States 9->50 32 C:\Users\user\AppData\...\Q7mmNEPsFu.exe, PE32 9->32 dropped 34 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 9->34 dropped 36 C:\Users\user\AppData\...\vcruntime140.dll, PE32 9->36 dropped 38 57 other files (none is malicious) 9->38 dropped 70 Tries to steal Mail credentials (via file access) 9->70 72 Tries to harvest and steal browser information (history, passwords, etc) 9->72 14 Q7mmNEPsFu.exe 9->14         started        17 cmd.exe 1 9->17         started        file6 signatures7 process8 signatures9 76 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->76 78 Hijacks the control flow in another process 14->78 80 Writes to foreign memory regions 14->80 82 Allocates memory in foreign processes 14->82 19 notepad.exe 14->19         started        84 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 17->84 86 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 17->86 88 Queries memory information (via WMI often done to detect virtual machines) 17->88 22 conhost.exe 17->22         started        24 timeout.exe 1 17->24         started        process10 signatures11 62 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 19->62 64 Hijacks the control flow in another process 19->64 66 Writes to foreign memory regions 19->66 68 2 other signatures 19->68 26 cmd.exe 4 19->26         started        30 cmd.exe 19->30         started        process12 dnsIp13 52 184.170.131.153, 15647, 49756 NETELLIGENTCA Canada 26->52 74 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 26->74 signatures14
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-06-21 00:46:49 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon discovery spyware stealer
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Checks installed software on the system
Looks up external IP address via web service
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Raccoon
Unpacked files
SH256 hash:
58f73699b95ad5410866d909e70d7ff37b4774fd32cc0ba7e1b8cbdcc4eba423
MD5 hash:
b8ee0bfec37eb04afbffbb1e7922914c
SHA1 hash:
58cb4b9b7e75b5eb160e7db9584d32ab6dce81a3
Detections:
win_raccoon_auto
SH256 hash:
c54228f797eb663e6a223ecf20f225f91bc2e1dfbea5ac84687ff87513a0dad5
MD5 hash:
e9a21ecbb9dd174fab29f35bc830427f
SHA1 hash:
51c13a1ce196ac6626ab644fb6b900ec3db913e5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Detects Raccoon/Racealer infostealer
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments