MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ebef1def6571bd1b556fa6467a818fc7c9143caad2524a91fcc891b251c8ea01. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: ebef1def6571bd1b556fa6467a818fc7c9143caad2524a91fcc891b251c8ea01
SHA3-384 hash: 3b8d01f3be26ab8a010d069f56db2446aa4dce2d58c187f97a2bad51cfed9e684ab49eed0a4df0d0cda6620bcbbd6cf7
SHA1 hash: cb92f9df68c9420a00bf7dd7a989eadb75d10132
MD5 hash: b70b2e25e1a58e5b8a2270f750231e04
humanhash: fillet-jersey-bacon-ink
File name:file
Download: download sample
File size:4'694'528 bytes
First seen:2023-04-25 14:02:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e742c24cfb407e861d818af89714e7b0
ssdeep 98304:gNbBgmFtnNHwhUMxnqJAxQFP+KoxMDvzyEs5hhEWaChpvfXlm9P69VSig:kNHwhUMxqJAOgzxAyViWbxfXlmMgig
TLSH T1F326334E19D982F0D5D603B8A61A5DDB23F6217F4A65CC6C3EC118827766FF2A02F463
TrID 56.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.1% (.EXE) Win32 Executable (generic) (4505/5/1)
3.7% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter jstrosch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
232
Origin country :
US US
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
https://telegra.ph/Full-Version-02-13-3
Verdict:
Malicious activity
Analysis date:
2023-04-25 12:35:21 UTC
Tags:
raccoon recordbreaker trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Hides threads from debuggers
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to evade analysis by execution special instruction (VM detection)
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Raccoonstealer
Status:
Malicious
First seen:
2023-04-25 14:03:10 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
338664b5583e779e1d64f74e072e18372ba560351baafe4d864d2227ace837d8
MD5 hash:
1449c41ae3bd40393268213a57ca399c
SHA1 hash:
23ba56b1046717dcda716c0b20666951001870ec
SH256 hash:
59decf3d3046310c6c3c27074498c2ada7d7ab335726887f652783dc92482781
MD5 hash:
d7182a0b1540711f87ec6a6a8e61b901
SHA1 hash:
cedb3d5ac659efc4b539a43893991a6bae1173bb
SH256 hash:
ebef1def6571bd1b556fa6467a818fc7c9143caad2524a91fcc891b251c8ea01
MD5 hash:
b70b2e25e1a58e5b8a2270f750231e04
SHA1 hash:
cb92f9df68c9420a00bf7dd7a989eadb75d10132
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe ebef1def6571bd1b556fa6467a818fc7c9143caad2524a91fcc891b251c8ea01

(this sample)

  
Delivery method
Distributed via web download

Comments