MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 deddab103a2aaae2ce26b6b3b1b1d263ac4c272584ec1d7d5ff8a96bcbaebd4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: deddab103a2aaae2ce26b6b3b1b1d263ac4c272584ec1d7d5ff8a96bcbaebd4f
SHA3-384 hash: 5838b989da2786c3db8c08bcf53b90cf7774b93a9a1456a4c5c5c0c98c61689c3bec2e27869776c4581043e0bb023e89
SHA1 hash: 85a92fb7d922a4d2c51bac03fedc2868599f23b5
MD5 hash: cb2be9b44b5ccb320e6e6eabfbe3123f
humanhash: timing-helium-vegan-west
File name:deddab103a2aaae2ce26b6b3b1b1d263ac4c272584ec1.exe
Download: download sample
Signature RaccoonStealer
File size:529'920 bytes
First seen:2021-09-05 10:20:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f530acf7acd4a5c8880ba2a4704d4cbb (14 x RaccoonStealer, 4 x Glupteba, 2 x Tofsee)
ssdeep 12288:S6xb7yfqVqrv+iVxg0P44EcsK6ADkjOUuB0f:F7yfqVcrZPpscmHS0
Threatray 3'846 similar samples on MalwareBazaar
TLSH T1F7B4F11E6E91E463C6F8C2344435E7B4DE3DBCA61D24968B7745FB9B2E302802A2D353
dhash icon b67e7c7d767e6e76 (5 x RaccoonStealer, 1 x CoinMiner)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://94.158.245.173/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://94.158.245.173/ https://threatfox.abuse.ch/ioc/215894/

Intelligence


File Origin
# of uploads :
1
# of downloads :
202
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
deddab103a2aaae2ce26b6b3b1b1d263ac4c272584ec1.exe
Verdict:
Malicious activity
Analysis date:
2021-09-05 10:25:42 UTC
Tags:
trojan stealer raccoon loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Connection attempt to an infection source
Sending a UDP request
Connection attempt
Sending an HTTP POST request
Query of malicious DNS domain
Sending a TCP request to an infection source
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw
Score:
88 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RacoonStealer
Status:
Malicious
First seen:
2021-09-05 06:41:01 UTC
AV detection:
26 of 42 (61.90%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:56be4efb71b0a38de783d05b401b05f1bc805bb2 discovery spyware stealer
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments