MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c686c7b2fff2ad2853c1d450d44fcf96ff3df67f34205b6b4e0352153893c924. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 7 File information Comments

SHA256 hash: c686c7b2fff2ad2853c1d450d44fcf96ff3df67f34205b6b4e0352153893c924
SHA3-384 hash: 512a1da6005d97f4ecb9d79811f1f2356086fc50e5adda23e8c465cbf2ee9c68378156ffe546a103e58b5cb8619a5f8a
SHA1 hash: 66cffe0dc5cb3de1f5c0e754bc0e21e712e756f0
MD5 hash: 826d68f6e4a2c308e91aad81c8368443
humanhash: rugby-steak-kansas-four
File name:826d68f6e4a2c308e91aad81c8368443.exe
Download: download sample
Signature RaccoonStealer
File size:1'318'912 bytes
First seen:2020-10-13 16:50:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c527ec4fd7e542f708e9a6ac42ef3593 (5 x RaccoonStealer)
ssdeep 24576:7s50MSJZFvFsSss9TDdfLVMls50MMl+TZMs50MoEP80kKYfu:7s5SJbvFsSdjfyls5s+TZMs5oIkKYfu
Threatray 988 similar samples on MalwareBazaar
TLSH BD5522269A630723F4066E708BD052D117FEBD277282ED1FFB8C252A07D1D464AC76B6
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
AZORult C2:
http://morasergio.ac.ug/index.php

ArkeiStealer C2:
http://morasegio.ug/

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Creating a file
Sending a custom TCP request
Deleting a recently created file
Reading critical registry keys
Replacing files
Delayed writing of the file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Stealing user critical data
Sending an HTTP POST request to an infection source
Result
Threat name:
AsyncRAT Azorult Raccoon Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Binary contains a suspicious time stamp
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Sigma detected: Executable Used by PlugX in Uncommon Location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 297482 Sample: 6nbA2OSx4c.exe Startdate: 13/10/2020 Architecture: WINDOWS Score: 100 113 marcapalgo.ug 2->113 115 macapslafg.ug 2->115 117 4 other IPs or domains 2->117 151 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->151 153 Found malware configuration 2->153 155 Malicious sample detected (through community Yara rule) 2->155 157 13 other signatures 2->157 12 6nbA2OSx4c.exe 16 2->12         started        signatures3 process4 file5 109 C:\Users\user\AppData\Local\...\Iytrgbdsf.exe, PE32 12->109 dropped 111 C:\Users\user\AppData\Local\...behaviorgraphdyhfdfg.exe, PE32 12->111 dropped 187 Detected unpacking (changes PE section rights) 12->187 189 Detected unpacking (overwrites its own PE header) 12->189 191 Maps a DLL or memory area into another process 12->191 16 Gdyhfdfg.exe 4 12->16         started        19 6nbA2OSx4c.exe 93 12->19         started        23 Iytrgbdsf.exe 4 12->23         started        signatures6 process7 dnsIp8 141 Detected unpacking (changes PE section rights) 16->141 143 Maps a DLL or memory area into another process 16->143 25 Gdyhfdfg.exe 71 16->25         started        119 trqqwsad.site 101.32.97.85, 443, 49740, 49741 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 19->119 121 telete.in 195.201.225.248, 443, 49738 HETZNER-ASDE Germany 19->121 123 192.168.2.1 unknown unknown 19->123 81 C:\Users\user\AppData\...\nB7yG1tjbl.exe, PE32 19->81 dropped 83 C:\Users\user\AppData\...\iu1CwdPblp.exe, PE32 19->83 dropped 85 C:\Users\user\AppData\...85W6nIHJhIw.exe, PE32 19->85 dropped 87 65 other files (none is malicious) 19->87 dropped 145 Tries to steal Mail credentials (via file access) 19->145 147 Tries to harvest and steal browser information (history, passwords, etc) 19->147 30 nB7yG1tjbl.exe 19->30         started        32 NW6nIHJhIw.exe 19->32         started        34 iu1CwdPblp.exe 19->34         started        149 Detected unpacking (overwrites its own PE header) 23->149 36 Iytrgbdsf.exe 188 23->36         started        file9 signatures10 process11 dnsIp12 129 morasegio.ug 217.8.117.77, 49737, 49739, 49745 CREXFEXPEX-RUSSIARU Russian Federation 25->129 131 morasergio.ac.ug 25->131 93 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 25->93 dropped 95 C:\Users\user\AppData\Local\Temp\ds2.exe, PE32 25->95 dropped 97 C:\Users\user\AppData\Local\Temp\ds1.exe, PE32 25->97 dropped 105 49 other files (1 malicious) 25->105 dropped 171 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 25->171 173 Tries to steal Instant Messenger accounts or passwords 25->173 175 Tries to steal Mail credentials (via file access) 25->175 185 2 other signatures 25->185 38 ac.exe 25->38         started        42 rc.exe 25->42         started        45 ds2.exe 25->45         started        49 2 other processes 25->49 133 discord.com 30->133 135 cdn.discordapp.com 30->135 177 Creates a thread in another existing process (thread injection) 30->177 179 Injects a PE file into a foreign processes 30->179 99 C:\ProgramData\vcruntime140.dll, PE32 36->99 dropped 101 C:\ProgramData\sqlite3.dll, PE32 36->101 dropped 103 C:\ProgramData\softokn3.dll, PE32 36->103 dropped 107 4 other files (none is malicious) 36->107 dropped 181 Tries to harvest and steal browser information (history, passwords, etc) 36->181 183 Tries to steal Crypto Currency Wallets 36->183 47 cmd.exe 36->47         started        file13 signatures14 process15 dnsIp16 89 C:\Users\user\AppData\Roaming\...\ddvlc.exe, PE32 38->89 dropped 159 Creates an undocumented autostart registry key 38->159 161 Adds a directory exclusion to Windows Defender 38->161 163 Injects a PE file into a foreign processes 38->163 51 ac.exe 38->51         started        54 powershell.exe 38->54         started        137 cdn.discordapp.com 162.159.134.233, 443, 49748, 49760 CLOUDFLARENETUS United States 42->137 139 discord.com 162.159.137.232, 443, 49746, 49747 CLOUDFLARENETUS United States 42->139 91 C:\Users\user\AppData\Local\...\Uvzmdrv.exe, PE32 42->91 dropped 165 Writes to foreign memory regions 42->165 167 Allocates memory in foreign processes 42->167 169 Creates a thread in another existing process (thread injection) 42->169 56 notepad.exe 42->56         started        58 ds2.exe 45->58         started        60 ds2.exe 45->60         started        62 conhost.exe 47->62         started        64 taskkill.exe 47->64         started        66 ds1.exe 49->66         started        69 3 other processes 49->69 file17 signatures18 process19 dnsIp20 125 marcapalgo.ug 51->125 127 masonp.ac.ug 79.134.225.40, 49758, 49761, 49762 FINK-TELECOM-SERVICESCH Switzerland 51->127 71 conhost.exe 54->71         started        73 powershell.exe 58->73         started        79 C:\Windows\Temp\pc45y5bf.exe, PE32 66->79 dropped 75 cmstp.exe 66->75         started        file21 process22 process23 77 conhost.exe 73->77         started       
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-10-13 16:04:42 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
discovery trojan infostealer family:azorult spyware evasion rat family:asyncrat family:oski family:modiloader
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Drops desktop.ini file(s)
JavaScript code in executable
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
ModiLoader First Stage
AsyncRat
Azorult
Contains code to disable Windows Defender
ModiLoader, DBatLoader
Modifies Windows Defender Real-time Protection settings
Oski
Malware Config
C2 Extraction:
:
Unpacked files
SH256 hash:
c686c7b2fff2ad2853c1d450d44fcf96ff3df67f34205b6b4e0352153893c924
MD5 hash:
826d68f6e4a2c308e91aad81c8368443
SHA1 hash:
66cffe0dc5cb3de1f5c0e754bc0e21e712e756f0
SH256 hash:
bb504b4028a76d6cf9774b6049ad22b40c13ebe70c0f95ecbd7abe4684f64647
MD5 hash:
a198b9a7d7312d141e770fc05937d43e
SHA1 hash:
e119533a7c337c94ec71316525dad53d97a9770f
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
b457938d84cc2d3665e4ed98c02cfc30bf118d5be8d1221c5bc0b701bfc01f3e
MD5 hash:
f2ccded349f56600711ffb7216639aba
SHA1 hash:
016723ac2cc5cbc5878c1b969642b4ae12d4ba6a
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
6ec8b8722011387a91473b37ca0349b07a8913ef6dd8577758a466ab7dcf8fad
MD5 hash:
c5fd08072b41f2c2ac8f44ed25360539
SHA1 hash:
534b1beaaee160be36c62e5a96330c85ca8cce07
Detections:
win_raccoon_a0 win_raccoon_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_oski_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_a0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe c686c7b2fff2ad2853c1d450d44fcf96ff3df67f34205b6b4e0352153893c924

(this sample)

Comments