MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cb2b0593dd5917cd2c733aec233994622c4eefc4876f5f3e4c90a241714766d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | cb2b0593dd5917cd2c733aec233994622c4eefc4876f5f3e4c90a241714766d3 |
|---|---|
| SHA3-384 hash: | de0a403e9cf361e36d385fcdd57dc9550450fe0e33c25aac3998069d29739c4deba425c1f6865f5743bf0f79c82fc6b3 |
| SHA1 hash: | 8245272e4d60a03b4ab2fc38ce61e16391df1f54 |
| MD5 hash: | 833b3ec3d707dadf9a80c781de0b245d |
| humanhash: | cola-ink-saturn-romeo |
| File name: | 833b3ec3d707dadf9a80c781de0b245d.exe |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 506'880 bytes |
| First seen: | 2021-11-09 09:51:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ef5891f13814421fd185279f57d98085 (7 x RaccoonStealer, 4 x RedLineStealer, 2 x ArkeiStealer) |
| ssdeep | 12288:0lohTwSkTZ7wmpLMfZP6wqah71egcLHe1GIsZ5e:2ofoZ7rYBiwq271egcL+sS |
| Threatray | 4'098 similar samples on MalwareBazaar |
| TLSH | T138B4E110ABE0C035F1FB56F80AB593A8B52E79A17B2590CF22D516EE67756E0DC3031B |
| File icon (PE): | |
| dhash icon | b2dacaaecee6baa6 (23 x RedLineStealer, 22 x Stop, 13 x Smoke Loader) |
| Reporter | |
| Tags: | exe RaccoonStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://194.180.174.182/ | https://threatfox.abuse.ch/ioc/245154/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
115
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Raccoon
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Self deletion via cmd delete
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2021-11-09 04:05:51 UTC
AV detection:
19 of 45 (42.22%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
raccoon
Similar samples:
+ 4'088 additional samples on MalwareBazaar
Result
Malware family:
raccoon
Score:
10/10
Tags:
family:raccoon botnet:fcdc156d3872c18d25e3ee45499599b45e492a67 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
28cce4b6322628a5cfb60c0cd45b42c149cf1a8451bf171cc99447142ec74a0c
MD5 hash:
9cecd33bbe1e0085e099690f1dfc1b73
SHA1 hash:
d81153ab1ba04568c0fe83b54e0886a23781c7bf
Detections:
win_raccoon_auto
Parent samples :
83d0fed0b41e7826aaf744d9910ae4868399e2ad9363deb39954d074c0947563
5d19e76272a53a59afc505378a006015c0cf372fbc3bb187ac983aad1f505a1e
53255e17e96d26798409e3ac3c60056d6028e4d40be210e25510ea08eaf9d43b
cfc3768cbc19e72ee4d54a18f6700e7f3fda452a901d3c1dae68ae4880edaf7d
37cae78403ee5027dba59dc25a7308f9338d82477d55de953e38ed824e954717
28f66da1f413201a98d2bf07a8566bac1f8f93e8a9f8803bffef73e6b4b388a1
2d85e863666e75ccb18a02a722332a08512bfad1474b88ccead4f04f3245c654
dcff5dfaace324b1c7a88575b563f7e6fafdab55df9fb9a8f096332c0adc1926
bdbbe7d8cffb4b5a6a6fd2709b1dc606514e007369bbb5cdbf65cf70074cff15
a5e226b09761a2b1ac21f6f690800dd384b118904be5e88ce9b2bf1e0ee615d7
0748cbae64a6051b9b5c6d33c28c0768949920509146abf3298803b0f86252d8
21301716ce1941af80e3fd44750c61348cb38ae02d322f4d8218ec4ceb2f1863
cb2b0593dd5917cd2c733aec233994622c4eefc4876f5f3e4c90a241714766d3
eff8d7d565c86cb1360f7a1cdecbb003913943d5733ab6ba79003193d19669cb
a5ab7f1f608fd4733f908f7327b7294e186ee229cea5bd87711c5cda425bd4de
92f09a639a1571411d84698a3efd2b50b203423b7baa78fd367545b0a56b42bf
648d4377805a064953a5f314f4038071a4d50fe85088e75c59136aa2a3d8c864
e04f6d6b73cbeb3b5ed8834cd2c8a386daeab02e94937b54f6579802c2433e31
67a5471d59ca74d55eda2a899d27e0c650b4bd66747461f1bdda634dc96d0c18
a6ef4df2da289c7494453df35117b375124fbe5b6dc7d6bc571f4218efc24e8e
5d19e76272a53a59afc505378a006015c0cf372fbc3bb187ac983aad1f505a1e
53255e17e96d26798409e3ac3c60056d6028e4d40be210e25510ea08eaf9d43b
cfc3768cbc19e72ee4d54a18f6700e7f3fda452a901d3c1dae68ae4880edaf7d
37cae78403ee5027dba59dc25a7308f9338d82477d55de953e38ed824e954717
28f66da1f413201a98d2bf07a8566bac1f8f93e8a9f8803bffef73e6b4b388a1
2d85e863666e75ccb18a02a722332a08512bfad1474b88ccead4f04f3245c654
dcff5dfaace324b1c7a88575b563f7e6fafdab55df9fb9a8f096332c0adc1926
bdbbe7d8cffb4b5a6a6fd2709b1dc606514e007369bbb5cdbf65cf70074cff15
a5e226b09761a2b1ac21f6f690800dd384b118904be5e88ce9b2bf1e0ee615d7
0748cbae64a6051b9b5c6d33c28c0768949920509146abf3298803b0f86252d8
21301716ce1941af80e3fd44750c61348cb38ae02d322f4d8218ec4ceb2f1863
cb2b0593dd5917cd2c733aec233994622c4eefc4876f5f3e4c90a241714766d3
eff8d7d565c86cb1360f7a1cdecbb003913943d5733ab6ba79003193d19669cb
a5ab7f1f608fd4733f908f7327b7294e186ee229cea5bd87711c5cda425bd4de
92f09a639a1571411d84698a3efd2b50b203423b7baa78fd367545b0a56b42bf
648d4377805a064953a5f314f4038071a4d50fe85088e75c59136aa2a3d8c864
e04f6d6b73cbeb3b5ed8834cd2c8a386daeab02e94937b54f6579802c2433e31
67a5471d59ca74d55eda2a899d27e0c650b4bd66747461f1bdda634dc96d0c18
a6ef4df2da289c7494453df35117b375124fbe5b6dc7d6bc571f4218efc24e8e
SH256 hash:
cb2b0593dd5917cd2c733aec233994622c4eefc4876f5f3e4c90a241714766d3
MD5 hash:
833b3ec3d707dadf9a80c781de0b245d
SHA1 hash:
8245272e4d60a03b4ab2fc38ce61e16391df1f54
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.