MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df894381206db5cb83860343b60baea0012d0d5535de1339492c121a51b84886. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: df894381206db5cb83860343b60baea0012d0d5535de1339492c121a51b84886
SHA3-384 hash: 210a7be0dac914e9c0161c938b67a5fec8d1948e24351536c78fd8199a461106824b65cab494e436c4308fba134ff1a2
SHA1 hash: 7f77b5205037eb4c0468015bc2e9caee738ed487
MD5 hash: f1683ed759a2e3058fa3137bcde9522c
humanhash: oregon-winner-quebec-florida
File name:F1683ED759A2E3058FA3137BCDE9522C.exe
Download: download sample
Signature RaccoonStealer
File size:3'759'104 bytes
First seen:2021-09-03 04:10:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 008f94f66b31c7c17b41ee47afe6a600 (1 x RaccoonStealer)
ssdeep 49152:TiQEhK+CPzXkfsfGlPVH7SZgOFFrGxKOLBy0R5BHQElNep3gvc9jSeULIhzjoV8b:8kwOGltbSZPrBOjRbHbNspB1UV8pnh
Threatray 114 similar samples on MalwareBazaar
TLSH T137061267312640CCE7FCC7BA8627BEB131FE167BCD816878D6A9F9D12D318D0A106646
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://5.181.156.221/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.221/ https://threatfox.abuse.ch/ioc/213378/

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
F1683ED759A2E3058FA3137BCDE9522C.exe
Verdict:
Malicious activity
Analysis date:
2021-09-03 04:13:43 UTC
Tags:
trojan stealer raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt to an infection source
Connection attempt
Sending an HTTP POST request
Sending a UDP request
Query of malicious DNS domain
Sending a TCP request to an infection source
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
76 / 100
Signature
Infostealer behavior detected
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-08-14 13:30:56 UTC
AV detection:
28 of 45 (62.22%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:a34a5e2a0dd041cefd2ac6537222d8e668343682 stealer
Behaviour
Modifies system certificate store
Raccoon
Raccoon Stealer Payload
Unpacked files
SH256 hash:
2cb84cdcb08739c0496e5c506d5e87606945726335724f911a5ffb65694bb9a7
MD5 hash:
c6dfe963bf5481296419d506263be656
SHA1 hash:
e7952a4472934a6cbc4012e00b11bf05041d0d9d
SH256 hash:
df894381206db5cb83860343b60baea0012d0d5535de1339492c121a51b84886
MD5 hash:
f1683ed759a2e3058fa3137bcde9522c
SHA1 hash:
7f77b5205037eb4c0468015bc2e9caee738ed487
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments