MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1621aa8dd1273a4b6e4f3e6b83188044af80c6ffe9aba2e7e191f159ce9b1eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 4 File information Comments

SHA256 hash: d1621aa8dd1273a4b6e4f3e6b83188044af80c6ffe9aba2e7e191f159ce9b1eb
SHA3-384 hash: 052415eccefed4660e5193e826bd6b53dea766c0897f39c6cf6bce47a1cc1118a09efb3cb19c5c8155a8489cd81d4997
SHA1 hash: 7389456ef535facc9fbde433b4286c618df806e7
MD5 hash: a8cbbdba951de49ff61ebf96f5f7b793
humanhash: bluebird-fanta-carolina-fanta
File name:a8cbbdba951de49ff61ebf96f5f7b793.exe
Download: download sample
Signature RaccoonStealer
File size:806'400 bytes
First seen:2021-06-26 08:10:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 561804e327d70d350d3a386252109151 (3 x RaccoonStealer, 2 x AZORult, 2 x Loki)
ssdeep 24576:vaU93lT2JTn7uQVYiTSOSMID+/PAoQOz4dqo4KO:vaU93x2xn7uQVXTmMg3dl
Threatray 3'243 similar samples on MalwareBazaar
TLSH 8F0512015E608A33C35A45F5C9BE0184C57ADC2273D3D57B974B78DAEBB2A8610B62F3
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://35.205.249.65/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://35.205.249.65/ https://threatfox.abuse.ch/ioc/154052/

Intelligence


File Origin
# of uploads :
1
# of downloads :
164
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a8cbbdba951de49ff61ebf96f5f7b793.exe
Verdict:
Malicious activity
Analysis date:
2021-06-26 08:11:41 UTC
Tags:
loader trojan stealer vidar rat azorult raccoon remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult Raccoon Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file access)
Yara detected AntiVM3
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 440834 Sample: Jkrr5ZFbnL.exe Startdate: 26/06/2021 Architecture: WINDOWS Score: 100 103 cdn.discordapp.com 2->103 115 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->115 117 Multi AV Scanner detection for domain / URL 2->117 119 Found malware configuration 2->119 121 14 other signatures 2->121 12 Jkrr5ZFbnL.exe 13 2->12         started        signatures3 process4 signatures5 143 Creates HTML files with .exe extension (expired dropper behavior) 12->143 145 Maps a DLL or memory area into another process 12->145 15 Jkrr5ZFbnL.exe 29 12->15         started        process6 dnsIp7 109 veronikaa.ac.ug 185.215.113.77, 49715, 49716, 49720 WHOLESALECONNECTIONSNL Portugal 15->109 111 karimgouss.ug 15->111 113 5 other IPs or domains 15->113 59 C:\Users\user\AppData\...\CcmfdgsaYsd.exe, PE32 15->59 dropped 61 C:\Users\user\AppData\...\CHmfdgaYsHsd.exe, PE32 15->61 dropped 63 C:\Users\user\AppData\Local\...\zxcvb[1].exe, PE32 15->63 dropped 65 C:\Users\user\AppData\Local\...\zxcv[1].EXE, PE32 15->65 dropped 19 CcmfdgsaYsd.exe 7 15->19         started        23 CHmfdgaYsHsd.exe 15 5 15->23         started        file8 process9 file10 75 C:\Users\user\AppData\...\FDfsdgdvca.exe, PE32 19->75 dropped 77 C:\Users\user\AppData\...\FDdgrhfgdfx.exe, PE32 19->77 dropped 123 Maps a DLL or memory area into another process 19->123 25 FDdgrhfgdfx.exe 4 19->25         started        28 FDfsdgdvca.exe 4 19->28         started        30 CcmfdgsaYsd.exe 19->30         started        79 C:\Users\user\AppData\...\axcxcvhgfc.exe, PE32 23->79 dropped 125 Contains functionality to steal Internet Explorer form passwords 23->125 127 Injects a PE file into a foreign processes 23->127 32 CHmfdgaYsHsd.exe 88 23->32         started        36 axcxcvhgfc.exe 2 23->36         started        signatures11 process12 dnsIp13 137 Maps a DLL or memory area into another process 25->137 38 FDdgrhfgdfx.exe 25->38         started        43 FDfsdgdvca.exe 28->43         started        97 tttttt.me 95.216.186.40, 443, 49721 HETZNER-ASDE Germany 32->97 99 35.205.249.65, 49722, 80 GOOGLEUS United States 32->99 101 192.168.2.1 unknown unknown 32->101 67 C:\Users\user\AppData\...\xuieaoEiIg.exe, PE32 32->67 dropped 69 C:\Users\user\AppData\...\xIX4a2dREb.exe, PE32 32->69 dropped 71 C:\Users\user\AppData\...\bSqWy6yhKI.exe, PE32 32->71 dropped 73 60 other files (none is malicious) 32->73 dropped 139 Tries to steal Mail credentials (via file access) 32->139 141 Tries to harvest and steal browser information (history, passwords, etc) 32->141 45 xuieaoEiIg.exe 32->45         started        47 xIX4a2dREb.exe 32->47         started        49 bSqWy6yhKI.exe 32->49         started        51 DCdJOyapnx.exe 32->51         started        file14 signatures15 process16 dnsIp17 105 veronikaa.ac.ug 38->105 81 C:\ProgramData\vcruntime140.dll, PE32 38->81 dropped 83 C:\ProgramData\sqlite3.dll, PE32 38->83 dropped 85 C:\ProgramData\softokn3.dll, PE32 38->85 dropped 93 4 other files (none is malicious) 38->93 dropped 129 Tries to harvest and steal browser information (history, passwords, etc) 38->129 131 Tries to steal Crypto Currency Wallets 38->131 53 cmd.exe 38->53         started        107 veronika.ac.ug 43->107 87 C:\Users\user\AppData\...\vcruntime140.dll, PE32 43->87 dropped 89 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32 43->89 dropped 91 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 43->91 dropped 95 45 other files (none is malicious) 43->95 dropped 133 Detected unpacking (changes PE section rights) 45->133 135 Detected unpacking (overwrites its own PE header) 45->135 file18 signatures19 process20 process21 55 conhost.exe 53->55         started        57 taskkill.exe 53->57         started       
Threat name:
Win32.Trojan.Masslogger
Status:
Malicious
First seen:
2020-07-04 15:22:11 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:azorult family:oski family:raccoon family:remcos botnet:67a1a4d96e0af06ab629d8d5c048c516a37dbc35 botnet:vvvvvvvvvv discovery evasion infostealer persistence rat spyware stealer trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry key
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Async RAT payload
AsyncRat
Azorult
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Oski
Raccoon
Remcos
Malware Config
C2 Extraction:
veronikaa.ac.ug
http://195.245.112.115/index.php
nothinglike.ac.ug:6969
brudfascaqezd.ac.ug:6969
Unpacked files
SH256 hash:
038b337015d1408a5f9f5d1b617def3886738dd3f97b706d699cbb96f16ea6e9
MD5 hash:
74b80fa477d093c8a3dcae712233d519
SHA1 hash:
c8e314383d5ff056ac278d394fdcb6bff3e40378
SH256 hash:
d1621aa8dd1273a4b6e4f3e6b83188044af80c6ffe9aba2e7e191f159ce9b1eb
MD5 hash:
a8cbbdba951de49ff61ebf96f5f7b793
SHA1 hash:
7389456ef535facc9fbde433b4286c618df806e7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CN_Honker_Acunetix_Web_Vulnerability_Scanner_8_x_Enterprise_
Author:Florian Roth
Description:Sample from CN Honker Pentest Toolset - file Acunetix_Web_Vulnerability_Scanner_8.x_Enterprise_Edition_KeyGen.exe
Reference:Disclosed CN Honker Pentest Toolset
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_Meteorite
Author:ditekSHen
Description:Detects Meteorite downloader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments