MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e282ef9e1d23c80f8ef68d929b2a45352d7932e4f115d662774044b349fe7857. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 14


Intelligence 14 IOCs 2 YARA 9 File information Comments

SHA256 hash: e282ef9e1d23c80f8ef68d929b2a45352d7932e4f115d662774044b349fe7857
SHA3-384 hash: 7eef75f10fa60bbccebb4295fd43a75f1ba5ad408d47fdcf77fd71738441a726a7321d6106882818f5983261ee202790
SHA1 hash: 47fb68b45e3a051a2adb642e53f65c7b82ca3002
MD5 hash: a07da855c104042f458271a043316e21
humanhash: uranus-oranges-spring-hamper
File name:a07da855c104042f458271a043316e21.exe
Download: download sample
Signature RaccoonStealer
File size:11'300'324 bytes
First seen:2021-12-16 03:05:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JdbjPzJgM1anIeoDb6yFa0cDE6+918SDkOWTV/dVDdLR+tFwqzlacnHe:JdHzJgMWEDbylDg8SDkFldLR+Fw
TLSH T1D9B63304D3EF6F67EF6D4D30799446EC9DA8D8D139E14292A63A73952BC0037835CAB2
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
45.9.20.168:46257

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.9.20.168:46257 https://threatfox.abuse.ch/ioc/276355/
65.108.69.168:13293 https://threatfox.abuse.ch/ioc/276365/

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
DNS request
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Searching for the window
Running batch commands
Launching a process
Creating a window
Creating a process with a hidden window
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 540718 Sample: lxapct6lYr.exe Startdate: 16/12/2021 Architecture: WINDOWS Score: 100 67 208.95.112.1 TUT-ASUS United States 2->67 69 192.210.222.94 SERVER-MANIACA United States 2->69 71 6 other IPs or domains 2->71 91 Multi AV Scanner detection for domain / URL 2->91 93 Antivirus detection for URL or domain 2->93 95 Antivirus detection for dropped file 2->95 97 21 other signatures 2->97 10 lxapct6lYr.exe 10 2->10         started        signatures3 process4 file5 45 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->45 dropped 13 setup_installer.exe 27 10->13         started        process6 file7 47 C:\Users\user\AppData\...\setup_install.exe, PE32 13->47 dropped 49 C:\Users\user\...\Mon14f4c8b2e543a.exe, PE32 13->49 dropped 51 C:\Users\user\AppData\...\Mon14f375dc803.exe, PE32 13->51 dropped 53 22 other files (14 malicious) 13->53 dropped 16 setup_install.exe 1 13->16         started        process8 signatures9 87 Adds a directory exclusion to Windows Defender 16->87 89 Disables Windows Defender (via service or powershell) 16->89 19 cmd.exe 16->19         started        21 cmd.exe 1 16->21         started        23 cmd.exe 1 16->23         started        26 6 other processes 16->26 process10 signatures11 28 Mon1440cc5a3364ff87.exe 19->28         started        33 Mon14047d5ff2845c22.exe 14 5 21->33         started        99 Adds a directory exclusion to Windows Defender 23->99 101 Disables Windows Defender (via service or powershell) 23->101 35 powershell.exe 16 23->35         started        37 Mon14296c0c4f.exe 26->37         started        39 Mon14e5c2784d0b778e.exe 26->39         started        41 Mon14406322acc80.exe 2 26->41         started        43 powershell.exe 25 26->43         started        process12 dnsIp13 73 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 28->73 75 212.193.30.29 SPD-NETTR Russian Federation 28->75 83 13 other IPs or domains 28->83 55 C:\Users\user\AppData\Local\...\setup[1].exe, PE32 28->55 dropped 57 C:\Users\user\AppData\...\search21[1].exe, PE32 28->57 dropped 59 C:\Users\user\AppData\Local\...\lxy[1].exe, PE32 28->59 dropped 65 29 other files (7 malicious) 28->65 dropped 103 Detected unpacking (creates a PE file in dynamic memory) 28->103 105 Creates HTML files with .exe extension (expired dropper behavior) 28->105 107 Machine Learning detection for dropped file 28->107 115 2 other signatures 28->115 77 148.251.234.83 HETZNER-ASDE Germany 33->77 85 2 other IPs or domains 33->85 61 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 33->61 dropped 109 Antivirus detection for dropped file 33->109 111 Detected unpacking (overwrites its own PE header) 33->111 63 C:\Users\user\AppData\...\Mon14296c0c4f.tmp, PE32 37->63 dropped 113 Obfuscated command line found 37->113 79 212.193.30.45 SPD-NETTR Russian Federation 39->79 81 2.56.59.42 GBTCLOUDUS Netherlands 39->81 file14 signatures15
Threat name:
ByteCode-MSIL.Trojan.Antiloadr
Status:
Malicious
First seen:
2021-12-14 02:42:00 UTC
File Type:
PE (Exe)
Extracted files:
345
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:socelars family:vidar botnet:03.12_build_3 botnet:915 botnet:efc20640b4b1564934471e6297b87d8657db774a aspackv2 discovery evasion infostealer spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
https://mstdn.social/@sergeev43
https://koyu.space/@sergeev45
http://www.yarchworkshop.com/
45.9.20.221:15590
Unpacked files
SH256 hash:
3f4aae06ce3806593350fe173716b397feb1701278e44c8dc6dab9fbae96d200
MD5 hash:
fc4a1a7f3a0da84f48cb6332de5c60bc
SHA1 hash:
f73fadedd9bd6486e5e63ea77a23408e7751b85c
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
93d9ce6291eb10f727da27c487816b29fcba1b907d252f94d11ea0c3a99175fa
MD5 hash:
c7fc3bcb573b112eca27af5ef7192cce
SHA1 hash:
e43a907bdaced88d3c4444844e72d2381e9f1ad7
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
4e3c72337ad6ede0f71934734ba639a39949c003d7943cb946ea4173b23fd0b7
MD5 hash:
88c2669e0bd058696300a9e233961b93
SHA1 hash:
fdbdc7399faa62ef2d811053a5053cd5d543a24b
SH256 hash:
e427b411d6c36c6f4b2b785d6f6443540617578221d784e9c82b708635924283
MD5 hash:
357cf9785c5e9b55f6592bd6fe4db07e
SHA1 hash:
f4e6e7a0f521c42544267b5106551f419635ca35
SH256 hash:
eedc6ea4c8ac8e8bc5b174271cbdbca451ae28b1b9fca988c3ea0b92cc9a33bb
MD5 hash:
e1052cd1d7a27c3a6088c12ccc4b14f4
SHA1 hash:
d575240875e1a86cea96f7f2c1862c8f7a39ca27
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
caf25adb1299b820e6e575e4cca3d3598eb3c1e5e94d51cfe19824c200bd9d40
MD5 hash:
8823baf6006b07947fc24c0b6b9f8521
SHA1 hash:
cf0f80a573576f6da7a3f824666a6702a0f45628
SH256 hash:
d0db073325938e8d72a0d212b09386bba00f5eb4100ad7c336bd5b9892cc684f
MD5 hash:
99a09860b2515191c35defe156af3fb3
SHA1 hash:
94bbb3eff93fd21a148f3d30e29a29da9a664b63
SH256 hash:
47d220fdda26be7b3cf5626972f309d1d88d55fb4035bb88e6c3da15dd2110f6
MD5 hash:
57b131529cc51e264bfc382db164b946
SHA1 hash:
8c9f06df1c885120bc803ba3b99fad8482ceb7e8
SH256 hash:
50f832c931d26a6d5e1a5ee8d3bea6b11c87b5d491fbfe9a97a8c529dfb9aaba
MD5 hash:
d645341238c6cf29c81d6f92221a1d48
SHA1 hash:
8870a4530d86ac0b89882deede6110b9fb017380
SH256 hash:
0a5f3568f10ef754b6a442803c9233907c42b492a422310717bd36ace631e42b
MD5 hash:
be933383c1507745ba7efbc8853de6c6
SHA1 hash:
51bc98624fe41dbcaad2966f48ac83c9712e0ea5
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
3acc532419a525268bac4fb06b04cac191eb118c9c176b2905d766fd9e3d2dbd
MD5 hash:
c21828f89e8aad95a899c649b36a90c7
SHA1 hash:
2f5d10925686d130764eade4e6dfb7dadf8d67c3
SH256 hash:
8a4e7c07be9a87bb29c4f3d680fdb5669c1e9034a50d615c438ae9c059ed3306
MD5 hash:
450fa1d607290cd0884ffe9357b1ed76
SHA1 hash:
2ef8d557014bb41445820ff872ce00584c15c8f4
SH256 hash:
d4b0c4f66166cf83625ececbca9a864a68cde0b8ffc0a22b4a7a9aa87807ea87
MD5 hash:
527ef700de0364ffb08678cc5bce583a
SHA1 hash:
17852bd91d182b5277cce675431ed9ab55ca2c94
SH256 hash:
af00e11faf3e4fdfeedfe2057f0d32a77bcf854249bba25d73c284560a0db48b
MD5 hash:
b0bb3b14f1edaa1e98689cc807d53a87
SHA1 hash:
15598f6274fd347c76985fc0aa2b6dbe77beab83
SH256 hash:
2a36653492b524793a284130741e32959d738d17ff444523c490fb97c7682452
MD5 hash:
14074a3260a0fb5805761d4cb8214a30
SHA1 hash:
05ffc323e949b970b66fe09fe9c14eac223fe30a
SH256 hash:
2a93372deb6f0605f375845720380f866fe0eecea899ca0c06c70cfa64cc4a93
MD5 hash:
75108a95a87c842b5df4a556be360458
SHA1 hash:
7aa74a8ba315480f32454df3a19c96684b726c6c
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
55780f64e283363b69d13f729e7b90a58a4d1526783d385574e3dfca8fa6c1c2
MD5 hash:
ae18376bc80cab006aca515d3c4d01d0
SHA1 hash:
e8892b17436d19f39f009bb704b0388788c4893a
SH256 hash:
458aa4a5b8dcd292a5e07b404d60600b2f855786f9e78ea791ecabfc4644ec92
MD5 hash:
77478a9f5e0dd922a1d18c99824df4a1
SHA1 hash:
70d79fc395da3e5eac1cc2205bccbe6ffed1d052
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
fb72a8a85ea7690082b67adfd963bace55dd17dfbd2ba66e82960f863b0e90c8
MD5 hash:
d923c36d744ed622634092fe56343fa7
SHA1 hash:
8b636f11bcaa6c106fccbb5ff05c8d8aebb88835
SH256 hash:
9840bf8a8853d2129717d7912a5b24c8b9980cff06a5b8b8a38a16430874e92e
MD5 hash:
aaa7538fa6daa7f989071c88f65114b1
SHA1 hash:
30306fff895fe6c1c87990541ce0fc5835c75a3a
SH256 hash:
3adbadbb81d7140d230649cc00d4b20bb0113cf508ff8fdfd4c5c5405cef2c66
MD5 hash:
a5637d5ae1265b602fc8470670dd852d
SHA1 hash:
04b2e1e3baf8d4f34a580eac702e72065ca1fbd8
SH256 hash:
919e6ac21df1a61a40ca3a1dabb6a4f5c50c85b8398594fa41687573ff90e52c
MD5 hash:
fcc3fcd8531ae593257f5d9a9636e008
SHA1 hash:
3e69525553fe9f96f6c5be30450c4747544fcb93
SH256 hash:
7dd80925b7fee9d8bf2bcbbb785217e46e794dceaaa62a7313b5ddc4841133aa
MD5 hash:
cd69fd6465722a61d316a5cf5c311d62
SHA1 hash:
0ceaadea78c5b5d50d6a0953e0143feb815095e4
SH256 hash:
1d4b2fa2da6b626f9275332dbd1aa82f060cfd9e99d10776198770ac5be95843
MD5 hash:
6f1646b36a833d81efef2757e7beb8d7
SHA1 hash:
a961c5a8d874b52d519926293e74b17e09cb2271
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
6a0242fc48d25c60c7b5657c4690d7279ab6998465b1000050ce7adb7ca5c74c
MD5 hash:
77f73f8811bef80689ce5b7dcceeb2d1
SHA1 hash:
8f6760221c47cc7dd7bdd796444b56fe08cad6d0
SH256 hash:
e282ef9e1d23c80f8ef68d929b2a45352d7932e4f115d662774044b349fe7857
MD5 hash:
a07da855c104042f458271a043316e21
SHA1 hash:
47fb68b45e3a051a2adb642e53f65c7b82ca3002
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments