MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dad5918b56e3943854b1386c7b9050b00f5b68b0f26bd44eb3639237145dc196. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 8


Intelligence 8 IOCs 1 YARA 13 File information Comments

SHA256 hash: dad5918b56e3943854b1386c7b9050b00f5b68b0f26bd44eb3639237145dc196
SHA3-384 hash: 695cacddefc6da3cad4fb0592d275cf4fd44a3f71720ea80bfb916826620eb4bb272bcfbe778e0e2e6d03e5f7964fcf9
SHA1 hash: 087751946f4f1292b1221958b7626d1efe048312
MD5 hash: ad3335a123f2ad4283e96d367b61ec85
humanhash: aspen-robert-mobile-johnny
File name:AD3335A123F2AD4283E96D367B61EC85.exe
Download: download sample
Signature RaccoonStealer
File size:4'537'104 bytes
First seen:2021-09-05 07:50:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xCCvLUBsgg6+Nf/mWmCI9kBqwTNOu8XRAB3jlFblKNlBWzFiSt7/C/:xzLUCgh+oz9kBZJyABTlalI5iSx6/
Threatray 496 similar samples on MalwareBazaar
TLSH T1342633053255C0FBFA030132A84DDFFEB5FDCBE807106E9353A9DA461E35A96B60B856
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://94.158.245.173/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://94.158.245.173/ https://threatfox.abuse.ch/ioc/215894/

Intelligence


File Origin
# of uploads :
1
# of downloads :
140
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
AD3335A123F2AD4283E96D367B61EC85.exe
Verdict:
No threats detected
Analysis date:
2021-09-05 07:51:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Sending a UDP request
Creating a file
Using the Windows Management Instrumentation requests
Launching the default Windows debugger (dwwin.exe)
Reading critical registry keys
Replacing files
Creating a process with a hidden window
Creating a window
Possible injection to a system process
Unauthorized injection to a recently created process
Query of malicious DNS domain
Connection attempt to an infection source
Sending a TCP request to an infection source
Blocking the Windows Defender launch
Sending an HTTP GET request to an infection source
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Cookie Stealer Cryptbot RedLine Socelars
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Submitted sample is a known malware sample
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Cookie Stealer
Yara detected Cryptbot
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 477908 Sample: Sbw1yUdMzi.exe Startdate: 05/09/2021 Architecture: WINDOWS Score: 100 129 prda.aadg.msidentity.com 2->129 131 clientconfig.passport.net 2->131 177 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->177 179 Antivirus detection for URL or domain 2->179 181 Antivirus detection for dropped file 2->181 183 16 other signatures 2->183 13 Sbw1yUdMzi.exe 18 2->13         started        16 rundll32.exe 2->16         started        18 svchost.exe 2->18         started        21 svchost.exe 2->21         started        signatures3 process4 dnsIp5 105 C:\Users\user\AppData\...\setup_install.exe, PE32 13->105 dropped 107 C:\Users\user\...\Sat01d39b63165076cf6.exe, PE32 13->107 dropped 109 C:\Users\user\AppData\...\Sat01ae6a02b12.exe, PE32 13->109 dropped 111 13 other files (8 malicious) 13->111 dropped 23 setup_install.exe 1 13->23         started        27 rundll32.exe 16->27         started        133 23.213.168.66 AKAMAI-ASUS United States 18->133 file6 process7 dnsIp8 135 hsiens.xyz 172.67.142.91, 49709, 80 CLOUDFLARENETUS United States 23->135 137 127.0.0.1 unknown unknown 23->137 185 Performs DNS queries to domains with low reputation 23->185 187 Adds a directory exclusion to Windows Defender 23->187 29 cmd.exe 23->29         started        31 cmd.exe 1 23->31         started        33 cmd.exe 1 23->33         started        42 8 other processes 23->42 189 Writes to foreign memory regions 27->189 191 Allocates memory in foreign processes 27->191 193 Creates a thread in another existing process (thread injection) 27->193 36 svchost.exe 27->36 injected 38 svchost.exe 27->38 injected 40 svchost.exe 27->40 injected signatures9 process10 signatures11 44 Sat0167ecaf5f3d9e0ae.exe 29->44         started        49 Sat0152d2e7e2627.exe 31->49         started        159 Submitted sample is a known malware sample 33->159 161 Obfuscated command line found 33->161 163 Uses ping.exe to sleep 33->163 171 2 other signatures 33->171 51 powershell.exe 25 33->51         started        165 System process connects to network (likely due to code injection or exploit) 36->165 167 Sets debug register (to hijack the execution of another thread) 36->167 169 Modifies the context of a thread in another process (thread injection) 36->169 53 svchost.exe 36->53         started        55 Sat0121d914644cacc0a.exe 42->55         started        57 Sat01ae6a02b12.exe 42->57         started        59 Sat0156f0a157aee8a1.exe 1 13 42->59         started        61 4 other processes 42->61 process12 dnsIp13 143 cdn.discordapp.com 162.159.135.233, 443, 49714 CLOUDFLARENETUS United States 44->143 113 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 44->113 dropped 195 Antivirus detection for dropped file 44->195 197 Machine Learning detection for dropped file 44->197 63 LzmwAqmV.exe 44->63         started        199 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 49->199 201 Maps a DLL or memory area into another process 49->201 203 Checks if the current machine is a virtual machine (disk enumeration) 49->203 66 explorer.exe 49->66 injected 149 2 other IPs or domains 53->149 205 Query firmware table information (likely to detect VMs) 53->205 207 Multi AV Scanner detection for dropped file 55->207 69 cmd.exe 55->69         started        71 dllhost.exe 55->71         started        145 37.0.10.237, 49713, 49723, 80 WKD-ASIE Netherlands 57->145 147 37.0.10.214, 49712, 80 WKD-ASIE Netherlands 57->147 151 3 other IPs or domains 57->151 209 May check the online IP address of the machine 57->209 211 Tries to harvest and steal browser information (history, passwords, etc) 57->211 213 Disable Windows Defender real time protection (registry) 57->213 153 3 other IPs or domains 59->153 115 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 59->115 dropped 155 3 other IPs or domains 61->155 215 Creates processes via WMI 61->215 73 Sat01419f8e1c6b.exe 61->73         started        76 WerFault.exe 61->76         started        file14 signatures15 process16 dnsIp17 117 C:\Users\user\AppData\Local\Temp\6.exe, PE32+ 63->117 dropped 119 C:\Users\user\AppData\Local\Temp\5.exe, PE32 63->119 dropped 121 C:\Users\user\AppData\Local\Temp\4.exe, PE32 63->121 dropped 127 5 other files (3 malicious) 63->127 dropped 78 2.exe 63->78         started        82 1.exe 63->82         started        84 Chrome3.exe 63->84         started        123 C:\Users\user\AppData\Roaming\ccifihr, PE32 66->123 dropped 173 Benign windows process drops PE files 66->173 175 Hides that the sample has been downloaded from the Internet (zone.identifier) 66->175 87 rundll32.exe 66->87         started        89 cmd.exe 69->89         started        91 conhost.exe 69->91         started        139 live.goatgame.live 172.67.222.125, 443, 49710 CLOUDFLARENETUS United States 73->139 125 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 73->125 dropped 93 conhost.exe 73->93         started        141 20.42.73.29 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 76->141 file18 signatures19 process20 dnsIp21 157 144.202.76.47 AS-CHOOPAUS United States 78->157 217 Antivirus detection for dropped file 78->217 219 Multi AV Scanner detection for dropped file 78->219 221 Machine Learning detection for dropped file 78->221 103 C:\Users\user\AppData\...\services64.exe, PE32+ 84->103 dropped 223 Obfuscated command line found 89->223 225 Uses ping.exe to sleep 89->225 95 Piu.exe.com 89->95         started        97 findstr.exe 89->97         started        99 PING.EXE 89->99         started        file22 signatures23 process24 process25 101 Piu.exe.com 95->101         started       
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-09-02 11:34:39 UTC
AV detection:
24 of 36 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:706 botnet:pub1 aspackv2 backdoor infostealer persistence stealer themida trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
viacetequn.site:80
Unpacked files
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
1d53a1741021d44478a5beea3fe9c2dad1d06f432f241acb36e6b9b31660c814
MD5 hash:
bbf07901d12da487eb9edc8a8f1d33c8
SHA1 hash:
f5564a97cc708c758acbb658332a41997d89aa7a
SH256 hash:
045825d13745aa9ef8cc93d332352990494067726a364dadf47c51bed728ab14
MD5 hash:
eb31b0cd0d9b6de414d180de5c93e8bb
SHA1 hash:
ec9713322d130db1f728b9ff1b02cb70900c0f67
SH256 hash:
67706b5ae1d207bd7b0057fbb44e31547092cd80fb901e45775fb40f9cdccf0c
MD5 hash:
653c79fbffe6166096dedb08f0f12316
SHA1 hash:
e5bd2cac33fd6c4742fa70d74e3de7c989af1718
SH256 hash:
ad05101ae1ec45000fcdc1b0affa4bdbe8527679648341214a79e0bf1fb15e09
MD5 hash:
aee8e3e9464a5102f590bc00742971c9
SHA1 hash:
c6638b9de9601a52c2e6f249e2e8842f58247808
SH256 hash:
8a77dd50b720322088fbe92aeba219cc744bd664ff660058b1949c3b9b428bac
MD5 hash:
d1d4b4d26a9b9714a02c252fb46b72ce
SHA1 hash:
af9e34a28f8f408853d3cd504f03ae43c03cc24f
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
6f2ebb994b673284d9ab68282b430a1187260d433121e3fc8f2207fd6e4ade79
MD5 hash:
061b73b8ee45a2fa238b777498b441d0
SHA1 hash:
93d30e87c008d82995bbeea40cff37ad4199291b
SH256 hash:
4e8ca184f38398d11526d7c798d422b08a0ee7a156f1e7e765b64adb383ec881
MD5 hash:
654936d420c063a8ac0b945cf4a9b580
SHA1 hash:
7a3d4b205973b44ffe0302338f3bfac9c5f5589f
SH256 hash:
63c7328a9cd79e55bb2407ca8727585f8e73cb0e1b08fba3a9436c5f9afc133f
MD5 hash:
810e68c511f03624eb2bbb74dd8cddfe
SHA1 hash:
21eac4bf3821482f7fc803ec34fda485202540e8
SH256 hash:
482178d3938d085dbc87462aea4da2b801c03eb20ba64d8be5517193d7629cef
MD5 hash:
dd5b3e223eaa65f5119c8c30a3c3a206
SHA1 hash:
a642ddc69ec4fcc1b78a059d5c325b7aead8c528
SH256 hash:
fb698a020f78afcce556e8a9101a1ae9f7580ab9029fab624297fb275a36e50a
MD5 hash:
280b4b8b1f4a67e3f71f9fe71b2e407f
SHA1 hash:
35d25d1bff934d64e33bb1e72cf95d85d9c5252d
SH256 hash:
674564b8cab8da6abadfbc6cfc4cc82c7e716ddfa9a7692cfad4815cd3a9f295
MD5 hash:
e3977c6eee1c9b29bdee3ae5347b4908
SHA1 hash:
faea31d73c8eb05abdb833b6a76b892140f0d3bb
SH256 hash:
dad5918b56e3943854b1386c7b9050b00f5b68b0f26bd44eb3639237145dc196
MD5 hash:
ad3335a123f2ad4283e96d367b61ec85
SHA1 hash:
087751946f4f1292b1221958b7626d1efe048312
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:vklogger_bin
Author:James_inthe_box
Description:Unknown Keylogger
Reference:https://www.hybrid-analysis.com/string-search/results/1e75a1d90f3a4e8c2d657f7cfa663947d02f98515db97881487e528e0ade4099
Rule name:win_cryptbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.cryptbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments