MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2c1530870532abdf2123652c9f97dc9de79dc8aabbb8cfd185b1011d6cdbb01. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 18 File information Comments

SHA256 hash: d2c1530870532abdf2123652c9f97dc9de79dc8aabbb8cfd185b1011d6cdbb01
SHA3-384 hash: d22ec0d603a87e43cc9f68e58f5984e3701ad5ea3c480b895573f789dd17c5e9bd0f95de21bc0c8924c5ed43580f8df4
SHA1 hash: a02f68c212c6eff206d88a58d2b8f18c46c02872
MD5 hash: e1c742ae4b7d10e026755e3fe5093d46
humanhash: yankee-ack-mockingbird-twenty
File name:e1c742ae4b7d10e026755e3fe5093d46.exe
Download: download sample
Signature RaccoonStealer
File size:1'093'632 bytes
First seen:2021-02-10 07:37:48 UTC
Last seen:2021-02-10 10:15:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5fafce47e59448c4a3ba51806e4255f1 (2 x RaccoonStealer, 1 x RemcosRAT)
ssdeep 24576:RiqotzYnxcXe7eqa56fha56iqotNT6IrOD7k41iqotkULdva5FY7kLbt7k7B:RiVdYnxnetcf056iV7zrODI41iVzOYIc
Threatray 1'993 similar samples on MalwareBazaar
TLSH 2E350107AB268443F0464A724ED297F1677EBC53B5423B0BEB48FE1C5DB16862CE0676
Reporter abuse_ch
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
98
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e1c742ae4b7d10e026755e3fe5093d46.exe
Verdict:
Malicious activity
Analysis date:
2021-02-10 07:46:55 UTC
Tags:
trojan rat azorult stealer vidar loader remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Sending a custom TCP request
Creating a file
Deleting a recently created file
Reading critical registry keys
Sending an HTTP POST request
Replacing files
Running batch commands
Creating a process with a hidden window
Unauthorized injection to a recently created process
Stealing user critical data
Unauthorized injection to a recently created process by context flags manipulation
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT Azorult Raccoon Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Executable Used by PlugX in Uncommon Location
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 350995 Sample: itqFYYnm5j.exe Startdate: 10/02/2021 Architecture: WINDOWS Score: 100 107 icacxndo.ac.ug 2->107 109 brudfascaqezd.ac.ug 2->109 111 3 other IPs or domains 2->111 121 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->121 123 Multi AV Scanner detection for domain / URL 2->123 125 Found malware configuration 2->125 127 18 other signatures 2->127 10 itqFYYnm5j.exe 16 2->10         started        signatures3 process4 file5 97 C:\Users\user\AppData\...\Bdgfhwsvcd.exe, PE32 10->97 dropped 99 C:\Users\user\AppData\...\ASvcrssdfq.exe, PE32 10->99 dropped 149 Detected unpacking (changes PE section rights) 10->149 151 Detected unpacking (overwrites its own PE header) 10->151 153 Maps a DLL or memory area into another process 10->153 14 Bdgfhwsvcd.exe 4 10->14         started        17 itqFYYnm5j.exe 87 10->17         started        21 ASvcrssdfq.exe 4 10->21         started        signatures6 process7 dnsIp8 155 Detected unpacking (changes PE section rights) 14->155 157 Maps a DLL or memory area into another process 14->157 23 Bdgfhwsvcd.exe 71 14->23         started        103 corrosionofconformity.top 172.67.192.213, 443, 49722 CLOUDFLARENETUS United States 17->103 105 tttttt.me 95.216.186.40, 443, 49720 HETZNER-ASDE Germany 17->105 71 C:\Users\user\AppData\...\mpktNcxiSt.exe, PE32 17->71 dropped 73 C:\Users\user\AppData\...\ZLqTojsEbg.exe, PE32 17->73 dropped 75 C:\Users\user\AppData\...\mGcFAepk4d.exe, PE32 17->75 dropped 77 60 other files (none is malicious) 17->77 dropped 159 Tries to steal Mail credentials (via file access) 17->159 28 ZLqTojsEbg.exe 17->28         started        30 mpktNcxiSt.exe 17->30         started        32 mGcFAepk4d.exe 17->32         started        36 2 other processes 17->36 161 Detected unpacking (overwrites its own PE header) 21->161 34 ASvcrssdfq.exe 188 21->34         started        file9 signatures10 process11 dnsIp12 115 hanxlas.ac.ug 185.215.113.77, 49723, 49724, 49726 WHOLESALECONNECTIONSNL Portugal 23->115 117 taurus.ug 23->117 79 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 23->79 dropped 81 C:\Users\user\AppData\Local\Temp\ds1.exe, PE32 23->81 dropped 83 C:\Users\user\AppData\Local\Temp\ds2.exe, PE32 23->83 dropped 93 49 other files (none is malicious) 23->93 dropped 133 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->133 135 Tries to steal Instant Messenger accounts or passwords 23->135 137 Tries to steal Mail credentials (via file access) 23->137 147 2 other signatures 23->147 38 rc.exe 23->38         started        42 ds1.exe 23->42         started        44 ac.exe 23->44         started        119 cdn.discordapp.com 162.159.135.233, 443, 49731, 49752 CLOUDFLARENETUS United States 28->119 85 C:\Users\Public\Libraries\Wxycezen.exe, PE32 28->85 dropped 139 Creates a thread in another existing process (thread injection) 28->139 141 Injects a PE file into a foreign processes 28->141 87 C:\Users\user\AppData\Local\...\tmpCCE3.tmp, XML 30->87 dropped 89 C:\Users\user\AppData\Roaming89AKqfx.exe, PE32 30->89 dropped 55 3 other processes 30->55 46 mGcFAepk4d.exe 32->46         started        49 mGcFAepk4d.exe 32->49         started        91 C:\ProgramData\vcruntime140.dll, PE32 34->91 dropped 95 6 other files (none is malicious) 34->95 dropped 143 Tries to harvest and steal browser information (history, passwords, etc) 34->143 145 Tries to steal Crypto Currency Wallets 34->145 51 cmd.exe 34->51         started        53 V50tTHpzTu.exe 36->53         started        57 2 other processes 36->57 file13 signatures14 process15 dnsIp16 113 cdn.discordapp.com 38->113 129 Creates a thread in another existing process (thread injection) 38->129 131 Injects a PE file into a foreign processes 38->131 101 C:\Windows\Temp\b1ycmcxm.exe, PE32 46->101 dropped 59 cmstp.exe 46->59         started        61 conhost.exe 51->61         started        63 taskkill.exe 51->63         started        65 conhost.exe 51->65         started        67 powershell.exe 53->67         started        69 conhost.exe 55->69         started        file17 signatures18 process19
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2021-02-08 23:50:45 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:azorult family:oski family:raccoon family:remcos botnet:e14a5e9cd530c82715817680493b12fd4d28c92a discovery evasion infostealer persistence ransomware rat spyware stealer trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
Enumerates connected drives
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
Async RAT payload
AsyncRat
Azorult
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Oski
Raccoon
Remcos
Malware Config
C2 Extraction:
icando.ug:6970
icacxndo.ac.ug:6970
http://195.245.112.115/index.php
nothinglike.ac.ug:6969
brudfascaqezd.ac.ug:6969
Unpacked files
SH256 hash:
473cebe513d6393fbb031f23c3af06ac7c6e194d42e97a6c25bbf8f4ddac0b24
MD5 hash:
723b4356e9d7d83c2f14befdd6f7c33a
SHA1 hash:
ac9f33af4bb1684dcfeacb3a2c039fc52b555b8f
Detections:
win_raccoon_auto
SH256 hash:
b67ea1b3e682a8e9c7fe0e1c23f2b69bb6bc6d382c410afb257704c318f3cffa
MD5 hash:
66a4d48e36697c7cfb2cce1447e80bd9
SHA1 hash:
3417bde2f964c26a7e69511bdf547623cd229a81
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
2f63116b11eafdebd32671aa742324a8fd34de397df6a73a618976dccf0fc492
MD5 hash:
39722effcf3b434f81d31b04ad116b81
SHA1 hash:
53041a90887651236bd5294fa73d38720140c60b
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
d2c1530870532abdf2123652c9f97dc9de79dc8aabbb8cfd185b1011d6cdbb01
MD5 hash:
e1c742ae4b7d10e026755e3fe5093d46
SHA1 hash:
a02f68c212c6eff206d88a58d2b8f18c46c02872
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:@ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Detects Raccoon/Racealer infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar infostealer variants
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:REMCOS_RAT_variants
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_oski_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe d2c1530870532abdf2123652c9f97dc9de79dc8aabbb8cfd185b1011d6cdbb01

(this sample)

Comments