MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e40b804cdb66cb7f2141d1cb0dd2933cca2cdca549e47c0e059813d51d25987a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: e40b804cdb66cb7f2141d1cb0dd2933cca2cdca549e47c0e059813d51d25987a
SHA3-384 hash: 27a09effcbff7154eb51a5fd2b2650ee84118448f21eecdbc32ea957ddabe8fba5a42a8416881b7cba54aa0ee50d5674
SHA1 hash: 367b05f59bc780999fd28b74b4939bd07dd1dc5c
MD5 hash: 7f665120f7f47e427833ba3101889215
humanhash: colorado-artist-equal-maine
File name:7f665120f7f47e427833ba3101889215.exe
Download: download sample
Signature RaccoonStealer
File size:453'632 bytes
First seen:2020-05-20 07:17:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c4041c6336bd986fcc35f8583080b75f (2 x RaccoonStealer)
ssdeep 12288:mK1mBlQ0nMf80SxmasX9f3Etv0+6QSBDJfnWwqq:ZWlehVqc4QWwp
Threatray 319 similar samples on MalwareBazaar
TLSH E9A41211BAE1C437C95B8A328424EBA05B7BFC215271C28B6B9517796E30FD14BF631A
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://34.105.255.170/gate/log.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Gandcrab
Status:
Malicious
First seen:
2020-05-20 03:28:12 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
24 of 31 (77.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe e40b804cdb66cb7f2141d1cb0dd2933cca2cdca549e47c0e059813d51d25987a

(this sample)

  
Delivery method
Distributed via web download

Comments