MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf9588ac6d9e1e69dad6298a0e1fa89c4930afdb5d522493f3bc56a5dbebd1d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: cf9588ac6d9e1e69dad6298a0e1fa89c4930afdb5d522493f3bc56a5dbebd1d1
SHA3-384 hash: b12106f5a7d78a66b43b1a577059dd82fb0bdacaee372e8b59f23165d80588514b0592efb4d76c4d57ef285ef9409796
SHA1 hash: 98a3f62e391e397a183348f6967b5b16b3d7bfb0
MD5 hash: cf16775ae7412187781d1962ff728f3c
humanhash: wyoming-mike-quebec-mirror
File name:cf16775ae7412187781d1962ff728f3c.exe
Download: download sample
Signature RaccoonStealer
File size:1'540'608 bytes
First seen:2021-09-03 02:06:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2a645568dd051b660052e7c94260bd20 (1 x RaccoonStealer)
ssdeep 12288:2RMcCsg2srAQ5RlQMCgnulYgjmrkkmrw:2isgLsQ5Rl5CdFjIm
Threatray 2'782 similar samples on MalwareBazaar
TLSH T15065E0113683C472E4922575D861C2F85F7ABC7189659D4F6AC93F7E3F306D2AB2830A
dhash icon a29ecabc86a6ba86 (2 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://5.181.156.221/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.221/ https://threatfox.abuse.ch/ioc/213378/

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cf16775ae7412187781d1962ff728f3c.exe
Verdict:
Malicious activity
Analysis date:
2021-09-03 02:08:02 UTC
Tags:
trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt to an infection source
Connection attempt
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Query of malicious DNS domain
Sending a TCP request to an infection source
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.MintTitirez
Status:
Malicious
First seen:
2021-09-01 06:41:07 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:48f173f191a42f0a06d44a1d5262eb98e1d6778c stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Raccoon
Raccoon Stealer Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
a2cb965c4dbb8754068b8b637317f6fbda32c6c3926e6c6f81f1f4bb8eaf0395
MD5 hash:
e44eed650714cdc2f312224c157aed86
SHA1 hash:
b961b7e26eb7607ef43f04ea3425ab4c4818833b
Detections:
win_raccoon_auto
SH256 hash:
cf9588ac6d9e1e69dad6298a0e1fa89c4930afdb5d522493f3bc56a5dbebd1d1
MD5 hash:
cf16775ae7412187781d1962ff728f3c
SHA1 hash:
98a3f62e391e397a183348f6967b5b16b3d7bfb0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments