MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e80d7de90473de5e1d9fb140d2537896872f7a7ca665e9342514426604f4f708. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 8 File information Comments

SHA256 hash: e80d7de90473de5e1d9fb140d2537896872f7a7ca665e9342514426604f4f708
SHA3-384 hash: 5cf201a1020350750319cf46d3a6c3b175d8a82772e5eb254cece7b0e986642bf9d41589610585a812bd5080deea78b7
SHA1 hash: 481687ef096ef507906ef877722638dd077f197f
MD5 hash: 1c17fa92adb586b40b04cf238e627899
humanhash: massachusetts-burger-pizza-bravo
File name:1c17fa92adb586b40b04cf238e627899.exe
Download: download sample
Signature RaccoonStealer
File size:2'018'816 bytes
First seen:2021-09-17 13:35:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 49152:IROy5/6oHjaGEWIq5eGt/r/BgWUB2Ake:IRxl6oOGv77WW
Threatray 3'850 similar samples on MalwareBazaar
TLSH T13895F00073EC8624E6EF2B31E4744A8417F6FC8AA67DD38D5905A9BE1DA6B418C117F3
dhash icon e09a676060678ee0 (14 x AsyncRAT, 5 x ValleyRAT, 4 x Formbook)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://179.43.175.24/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://179.43.175.24/ https://threatfox.abuse.ch/ioc/222954/
http://maurizio.ug/ https://threatfox.abuse.ch/ioc/223007/

Intelligence


File Origin
# of uploads :
1
# of downloads :
154
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1c17fa92adb586b40b04cf238e627899.exe
Verdict:
Malicious activity
Analysis date:
2021-09-17 13:38:55 UTC
Tags:
trojan stealer raccoon loader rat azorult

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Launching a service
DNS request
Connection attempt
Sending an HTTP GET request
Launching a process
Creating a file in the %temp% directory
Delayed writing of the file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint monero obfuscated packed stealer
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
80 / 100
Signature
Encrypted powershell cmdline option found
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for sample
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to steal Mail credentials (via file access)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 485181 Sample: jIpiZgkx9H.exe Startdate: 17/09/2021 Architecture: WINDOWS Score: 80 60 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->60 62 Yara detected Raccoon Stealer 2->62 64 Machine Learning detection for sample 2->64 66 3 other signatures 2->66 8 jIpiZgkx9H.exe 18 8 2->8         started        process3 dnsIp4 50 pshmn.com 69.197.158.18, 49740, 49741, 49815 WIIUS United States 8->50 52 ping.pushmon.com 8->52 30 C:\Users\user\AppData\...\jIpiZgkx9H.exe, PE32 8->30 dropped 32 C:\...\Mfucqhgsfynmxokmaconsoleapp13.exe, PE32 8->32 dropped 34 C:\Users\...\jIpiZgkx9H.exe:Zone.Identifier, ASCII 8->34 dropped 36 2 other malicious files 8->36 dropped 70 Encrypted powershell cmdline option found 8->70 13 jIpiZgkx9H.exe 79 8->13         started        18 wscript.exe 1 8->18         started        20 powershell.exe 18 8->20         started        file5 signatures6 process7 dnsIp8 54 185.215.113.77, 49823, 80 WHOLESALECONNECTIONSNL Portugal 13->54 56 179.43.175.24, 49814, 49817, 49822 PLI-ASCH Panama 13->56 58 telete.in 195.201.225.248, 443, 49813 HETZNER-ASDE Germany 13->58 38 C:\Users\user\AppData\...\3sPju9odrr.exe, PE32 13->38 dropped 40 C:\Users\user\AppData\...\vcruntime140.dll, PE32 13->40 dropped 42 C:\Users\user\AppData\...\ucrtbase.dll, PE32 13->42 dropped 44 56 other files (none is malicious) 13->44 dropped 72 Tries to steal Mail credentials (via file access) 13->72 22 Mfucqhgsfynmxokmaconsoleapp13.exe 14 3 18->22         started        26 conhost.exe 20->26         started        file9 signatures10 process11 dnsIp12 46 pshmn.com 22->46 48 ping.pushmon.com 22->48 68 Encrypted powershell cmdline option found 22->68 28 powershell.exe 22->28         started        signatures13 process14
Threat name:
ByteCode-MSIL.Infostealer.Azorult
Status:
Malicious
First seen:
2021-09-17 13:36:16 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:azorult family:oski discovery infostealer persistence spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies registry key
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M3
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
maurizio.ug
Unpacked files
SH256 hash:
e353993ff247913b3ef8c56eb8396891ea3a3b94b2c463b341abfaf2e51a1b2f
MD5 hash:
7965ad6232cb90f859412846dd12f28d
SHA1 hash:
c2e24693e0d2b2553d0672b13f5badf27203b2cc
SH256 hash:
c1f46d167c5980baae47b73c5fce0491c457bf05bc6591f005ff661d6f80f29b
MD5 hash:
604bcc71338a7bd9625c4c8f494f1483
SHA1 hash:
af14afd38f05cc0d12cc0a4f7e7c07b1e95a6fa1
Detections:
win_karkoff_auto
SH256 hash:
761ba65cfde056295316064c72fb55c90430da5da1804b8d2274857d0abafe72
MD5 hash:
997c947021f4b5b9b9df61e6936d6145
SHA1 hash:
ab417deedf2404e0b113a7811ee13a896dc19186
SH256 hash:
0f6fe124ae1394581e89369206734305b8db162b80cc1d79127d5f85dbae90f1
MD5 hash:
a64be19dda99ba9a5fd81badc068f89a
SHA1 hash:
13a8ca43ddbd34ffcca51fb8063f7cf9be1235bd
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
7cf52a1f9e36b58f37b4e71d0ddfeaa9b4407dd6805f369be2c4cc2fdcd4ea1c
MD5 hash:
9245d37eca39dfdce551eab37ccce1fe
SHA1 hash:
f39534555f5e22c0b8a15190554857ed695e8d93
SH256 hash:
e7dce1de7b76cc7a61c8f2517e2b229dccec434880b0c59a1134c49d7c9b55d8
MD5 hash:
f7ff41bf043de51b2f94f30092878da9
SHA1 hash:
ae2d457e2894f36f4d1adf469b4f69570e58e9a1
SH256 hash:
c83a25c0161ddcd918eb5a1a63597713c29ed846c367e5f66644f70710afee80
MD5 hash:
1f8ff26d08702106b8ed9654a9c54278
SHA1 hash:
05203528830886f42688e478358a1c2af80f3d6a
Detections:
win_raccoon_auto
SH256 hash:
e80d7de90473de5e1d9fb140d2537896872f7a7ca665e9342514426604f4f708
MD5 hash:
1c17fa92adb586b40b04cf238e627899
SHA1 hash:
481687ef096ef507906ef877722638dd077f197f
Detections:
win_karkoff_auto
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Azorult
Author:JPCERT/CC Incident Response Group
Description:detect Azorult in memory
Reference:internal research
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_azorult_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.azorult.
Rule name:win_karkoff_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe e80d7de90473de5e1d9fb140d2537896872f7a7ca665e9342514426604f4f708

(this sample)

Comments