MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d00b481be4fa65ceba3125d6741e76792fd98fe4ed427dd498afda550c1927d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: d00b481be4fa65ceba3125d6741e76792fd98fe4ed427dd498afda550c1927d1
SHA3-384 hash: 1e64bc62f8bef7dd23703a4c0d1bd3751f0f9bdf23628e22090d6b1599ed4a7da2fe215d70d78ee62bcb5f8cf98f89a7
SHA1 hash: 563412c8a2cdb68549565cff6ad7492384d5d832
MD5 hash: bf2401d1c7f0bd4105bbd968536915cc
humanhash: eleven-butter-nine-hawaii
File name:FullInstall.exe
Download: download sample
Signature RaccoonStealer
File size:443'904 bytes
First seen:2021-09-23 13:29:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e0383fee3aa7c9c4dbf3a05a98d01075 (4 x RaccoonStealer, 3 x RedLineStealer, 2 x CoinMiner)
ssdeep 12288:y+diCeyg3IZS2VrZzaDBBpFTlqADLDDtUwg6OF:d59PoBXFTl5bgR
Threatray 3'195 similar samples on MalwareBazaar
TLSH T1709401E236B0C031D7F39A319938F7945A7B7572AB72958E37881B6C2F711D09A26307
File icon (PE):PE icon
dhash icon 1072c093b0381906 (22 x RedLineStealer, 22 x RaccoonStealer, 20 x Stop)
Reporter Anonymous
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-09-23 13:30:09 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:eeb7fa0213d8654d115aa51e13b01bc804e1dde5 stealer
Behaviour
Raccoon
Unpacked files
SH256 hash:
91d6e3875115ffb0e7a84c8741fdcbc0babf828ac14bcbf3484852a4a8bc5475
MD5 hash:
0326c24f34f04b2549082eecfdd068a4
SHA1 hash:
d971bd93ace2243b7860e7c604aa3f934a81d406
Detections:
win_raccoon_auto
SH256 hash:
d00b481be4fa65ceba3125d6741e76792fd98fe4ed427dd498afda550c1927d1
MD5 hash:
bf2401d1c7f0bd4105bbd968536915cc
SHA1 hash:
563412c8a2cdb68549565cff6ad7492384d5d832
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments