MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3904895453928a24306c37594dc8696540cb1079f814cdfca9c0a7c7be8bd99. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: e3904895453928a24306c37594dc8696540cb1079f814cdfca9c0a7c7be8bd99
SHA3-384 hash: 88e09d11c907adf467b18ad89f96b7876d7e89b42b0fb28abebfcd3c7a3363c728a5085c0c0f38fa212224692b41c853
SHA1 hash: b101fe89f9aaf93e65fa13aa4b9911bdaa6fa7bc
MD5 hash: 8d0665fe97012b30205ddd6a59b6845f
humanhash: hamper-papa-india-nebraska
File name:SecuriteInfo.com.Trojan.Siggen10.9113.10424.29788
Download: download sample
Signature RaccoonStealer
File size:1'110'016 bytes
First seen:2020-08-29 07:36:07 UTC
Last seen:2020-08-29 20:50:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0320232b42c0bfbc92efc4f95a2299b9 (3 x RaccoonStealer)
ssdeep 12288:0+lpK46tGeGemWFuY8MGJrzXzK4glVlceHnIQSKi669mBNlmxwSQxuwY6jzN66sN:0sQYeUyQrj47c4HSKi3gBzmeVxT/EbN
Threatray 1 similar samples on MalwareBazaar
TLSH F23512172A671273F4964A356BD185E44BBDFC2731C6692FCF442A981CE3A4EC583A33
Reporter SecuriteInfoCom
Tags:RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a file
Creating a process from a recently created file
Sending a UDP request
DNS request
Sending a custom TCP request
Deleting a recently created file
Reading critical registry keys
Replacing files
Delayed writing of the file
Sending an HTTP POST request
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Searching for the window
Delayed reading of the file
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Launching a tool to kill processes
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Result
Threat name:
AsyncRAT Azorult Raccoon Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
Contains functionality to steal Internet Explorer form passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Executable Used by PlugX in Uncommon Location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Keylogger Generic
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 279438 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 29/08/2020 Architecture: WINDOWS Score: 100 109 fgdjhksdfsdxcbv.ru 2->109 111 asdxcvxdfgdnbvrwe.ru 2->111 113 4 other IPs or domains 2->113 127 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->127 129 Multi AV Scanner detection for domain / URL 2->129 131 Malicious sample detected (through community Yara rule) 2->131 133 15 other signatures 2->133 12 SecuriteInfo.com.Trojan.Siggen10.9113.10424.exe 16 2->12         started        16 cmd.exe 2->16         started        18 taskkill.exe 2->18         started        signatures3 process4 file5 105 C:\Users\user\AppData\Local\...\Hgfkdfavc.exe, PE32 12->105 dropped 107 C:\ProgramData\Pnjgfhetr.exe, PE32 12->107 dropped 167 Detected unpacking (changes PE section rights) 12->167 169 Detected unpacking (overwrites its own PE header) 12->169 171 Contains functionality to steal Internet Explorer form passwords 12->171 173 Maps a DLL or memory area into another process 12->173 20 Hgfkdfavc.exe 4 12->20         started        23 Pnjgfhetr.exe 4 12->23         started        25 SecuriteInfo.com.Trojan.Siggen10.9113.10424.exe 79 12->25         started        29 j15zqo5f.exe 16->29         started        31 conhost.exe 16->31         started        33 conhost.exe 18->33         started        signatures6 process7 dnsIp8 135 Detected unpacking (changes PE section rights) 20->135 137 Maps a DLL or memory area into another process 20->137 35 Hgfkdfavc.exe 66 20->35         started        139 Antivirus detection for dropped file 23->139 141 Multi AV Scanner detection for dropped file 23->141 143 Detected unpacking (overwrites its own PE header) 23->143 145 Machine Learning detection for dropped file 23->145 40 Pnjgfhetr.exe 153 23->40         started        121 telete.in 195.201.225.248, 443, 49727 HETZNER-ASDE Germany 25->121 123 projectz.ug 25->123 125 34.65.231.1, 49733, 49737, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 25->125 95 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 25->95 dropped 97 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 25->97 dropped 99 C:\Users\user\AppData\...\vcruntime140.dll, PE32 25->99 dropped 101 57 other files (none is malicious) 25->101 dropped 147 Tries to steal Mail credentials (via file access) 25->147 149 Hides threads from debuggers 25->149 file9 signatures10 process11 dnsIp12 115 projectx.ug 217.8.117.77, 49726, 49728, 49736 CREXFEXPEX-RUSSIARU Russian Federation 35->115 77 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 35->77 dropped 79 C:\Users\user\AppData\Local\Temp\ds1.exe, PE32 35->79 dropped 81 C:\Users\user\AppData\Local\Temp\ac.exe, PE32 35->81 dropped 89 49 other files (none is malicious) 35->89 dropped 151 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 35->151 153 Tries to steal Instant Messenger accounts or passwords 35->153 155 Tries to steal Mail credentials (via file access) 35->155 161 2 other signatures 35->161 42 ac.exe 35->42         started        46 ds1.exe 35->46         started        48 ds2.exe 35->48         started        52 2 other processes 35->52 117 projecty.ug 40->117 119 192.168.2.1 unknown unknown 40->119 83 C:\ProgramData\vcruntime140.dll, PE32 40->83 dropped 85 C:\ProgramData\sqlite3.dll, PE32 40->85 dropped 87 C:\ProgramData\softokn3.dll, PE32 40->87 dropped 91 4 other files (none is malicious) 40->91 dropped 157 Tries to steal Crypto Currency Wallets 40->157 159 Hides threads from debuggers 40->159 50 cmd.exe 40->50         started        file13 signatures14 process15 file16 103 C:\Users\user\AppData\...\KIiEzYfPlc.exe, PE32 42->103 dropped 163 Writes to foreign memory regions 42->163 165 Injects a PE file into a foreign processes 42->165 54 ds1.exe 46->54         started        57 ds2.exe 48->57         started        59 conhost.exe 50->59         started        61 taskkill.exe 50->61         started        63 conhost.exe 52->63         started        65 timeout.exe 52->65         started        signatures17 process18 file19 93 C:\Windows\Temp\j15zqo5f.exe, PE32 54->93 dropped 67 cmstp.exe 54->67         started        69 powershell.exe 57->69         started        71 powershell.exe 57->71         started        73 powershell.exe 57->73         started        process20 process21 75 conhost.exe 69->75         started       
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2020-08-27 15:05:14 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
ransomware stealer family:raccoon discovery evasion trojan infostealer family:azorult family:oski spyware
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency wallets, possible credential harvesting
Checks installed software on the system
Drops desktop.ini file(s)
JavaScript code in executable
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
Azorult
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Oski
Raccoon
Raccoon log file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_oski_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe e3904895453928a24306c37594dc8696540cb1079f814cdfca9c0a7c7be8bd99

(this sample)

Comments