MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd10f58df6446ff26a7289ee4f708846994e7bd20b3895e3121e6e0c515a9604. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 2 File information Comments

SHA256 hash: cd10f58df6446ff26a7289ee4f708846994e7bd20b3895e3121e6e0c515a9604
SHA3-384 hash: fd6293e516fb12927dcd10173acca8eb5ee17bc4bce022b25b5191af0b0f49196e4bf833188597d3ca52128d1f26bcc1
SHA1 hash: 2ec0d867dd093e78cc6fa9c1119cec3fe35f1a59
MD5 hash: f86d3dd5e4507ccc7f5f03583f716bb1
humanhash: mike-missouri-eight-winter
File name:f86d3dd5e4507ccc7f5f03583f716bb1.exe
Download: download sample
Signature RaccoonStealer
File size:456'704 bytes
First seen:2021-09-06 22:07:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c07c5f8b51cfbe666b5660939365cb2b (5 x RedLineStealer, 2 x ArkeiStealer, 1 x Smoke Loader)
ssdeep 12288:qtqD8KabS5vxb4iW9YiSBDnOP1cBqKmsywJXg:qtqDv0S5Jb4iKAmcBfms1K
Threatray 3'430 similar samples on MalwareBazaar
TLSH T17BA41220E952D17AC9E24D355838FAA02EB57D502938C54B7FD94AAF8F307D2A277307
dhash icon e89a1a3a9adcc871 (1 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://45.142.215.237/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.142.215.237/ https://threatfox.abuse.ch/ioc/216755/

Intelligence


File Origin
# of uploads :
1
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f86d3dd5e4507ccc7f5f03583f716bb1.exe
Verdict:
Malicious activity
Analysis date:
2021-09-06 22:16:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file
Sending a UDP request
Deleting a recently created file
Reading critical registry keys
Delayed reading of the file
Running batch commands
Launching a process
Stealing user critical data
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw
Score:
80 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-08-19 06:22:00 UTC
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:c4e5c0d8949dac5650e5eccbc31a1dde6c0c8eeb stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
de2123243ed93308cd41aaccbb0f78d2bd914da97e7ca36cf812082fb2aa71d7
MD5 hash:
877cd8fbf5fa2da51c6471d4d3cc9479
SHA1 hash:
d283ae95a8074177d83c65aa2e6c9074074ba9b8
Detections:
win_raccoon_auto
SH256 hash:
cd10f58df6446ff26a7289ee4f708846994e7bd20b3895e3121e6e0c515a9604
MD5 hash:
f86d3dd5e4507ccc7f5f03583f716bb1
SHA1 hash:
2ec0d867dd093e78cc6fa9c1119cec3fe35f1a59
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments