MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e93548a1cbb3688e11b0eb6d4682ceee5df0ed380c703133b9f3e7455b8405e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 8
| SHA256 hash: | e93548a1cbb3688e11b0eb6d4682ceee5df0ed380c703133b9f3e7455b8405e3 |
|---|---|
| SHA3-384 hash: | 55b58d06e09ca05110d73f51729352b9c25d50475c9122da2ac18bffaaa17ab7ab51c3e4c8c874aed3f350cfda7a942b |
| SHA1 hash: | 317ed53f41dd3e88fa6db2b36c0454391ceab8ca |
| MD5 hash: | ecfb302b469218cdb9806aa24229a73e |
| humanhash: | papa-seventeen-apart-speaker |
| File name: | e93548a1cbb3688e11b0eb6d4682ceee5df0ed380c703133b9f3e7455b8405e3 |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 412'672 bytes |
| First seen: | 2020-11-06 11:26:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | cb831338d78206257b25bde73295c77f (16 x RaccoonStealer) |
| ssdeep | 12288:rr/XMLAlfDGez2sC6g+JH8Peetu7qOU8:P/rd3z2slgsEe7qOR |
| Threatray | 235 similar samples on MalwareBazaar |
| TLSH | 169412126AD2C9B4C483057058698EA98EBF6D74273418CB77243EAE6F707E1D73272D |
| Reporter | |
| Tags: | RaccoonStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Behaviour
Unpacked files
8bbe94099199227024f9d61d2feec94af43377fad2cb84b377c57b76517aba54
e93548a1cbb3688e11b0eb6d4682ceee5df0ed380c703133b9f3e7455b8405e3
edbc2fdaea1c75a2817bd067b44c19c1949954b1649e60061878bbfdbe01b6be
e230ba8783088519ca9752df1526cee86495cf890562093e88d1f4b86448d4ae
d8a2045665b6481d5f54ed0efb7bf2cc188a828da343439fe5833c2b320f40a1
2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4
0f3a62b00591669252ec0442ec1cb08c4d48f24d91c0012c8f685226dca5fc50
0546cc2b40978832d956bb5e4267652609bb8873a3675928bd50ba3753199aea
44e730df1763a00fc7a1dc83b4fc632f3029dc720cce065cfd5d6811bf4b4e5f
859f3dacf28798c4a3b274f2675fb983da6d1016f939a85697de1dfd0ea70f55
b557b4af472ef5827704d4e22fcfc80751f4de5024a09b6d72c62827af963f9c
67b8dc848012368effb6d4ecee72f0a19773d1940edd792c5293ffa0991ec8e7
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Email_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Email in files like avemaria |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | @ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | win_raccoon_a0 |
|---|---|
| Author: | Slavo Greminger, SWITCH-CERT |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.