MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ed58ffee46a583c177c792b56c9fc20ccd9509d125f2e3fc90c4f48de7e2c2a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 16


Intelligence 16 IOCs 2 YARA 3 File information Comments

SHA256 hash: ed58ffee46a583c177c792b56c9fc20ccd9509d125f2e3fc90c4f48de7e2c2a1
SHA3-384 hash: 18cdfa1f817a3c2693f5fc9a6c3ce8392053ebec26bf0f4622452520ab729fc65c3207acc6105e335b4e85dabae25ab6
SHA1 hash: bef5209ae90a3bd3171e1e0be4e8148c4ccd8a6a
MD5 hash: 8f1c8b40c7be588389a8d382040b23bb
humanhash: angel-oxygen-fix-football
File name:8f1c8b40c7be588389a8d382040b23bb.exe
Download: download sample
Signature RaccoonStealer
File size:1'241'088 bytes
First seen:2021-12-10 13:46:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1715d4e9b83d4067f1f68c3c4012c17 (1 x RaccoonStealer, 1 x AZORult)
ssdeep 24576:mMyMzC8+ovorlBtugg0uHqJkSkSZI7C8JaYRHwOwhNGWwQ58Xaj8rac:mMHF+lxuPHYkSfI77aYRQOayac
Threatray 11'646 similar samples on MalwareBazaar
TLSH T1C64501037A254403E1580A7249E697E53B3EBD17B6036E1FF788BE2D1CB27462DE057A
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://185.163.204.230/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.163.204.230/ https://threatfox.abuse.ch/ioc/273518/
http://prepepe.ac.ug/ https://threatfox.abuse.ch/ioc/273519/

Intelligence


File Origin
# of uploads :
1
# of downloads :
330
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8f1c8b40c7be588389a8d382040b23bb.exe
Verdict:
Malicious activity
Analysis date:
2021-12-10 13:51:19 UTC
Tags:
trojan stealer vidar raccoon rat azorult

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
67%
Tags:
anti-debug anti-vm greyware hacktool obfuscated packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult Clipboard Hijacker DBatLoader Ra
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to steal Internet Explorer form passwords
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Clipboard Hijacker
Yara detected DBatLoader
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 537862 Sample: BQvbHU7WJb.exe Startdate: 10/12/2021 Architecture: WINDOWS Score: 100 95 www.uplooder.net 2->95 111 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->111 113 Malicious sample detected (through community Yara rule) 2->113 115 Antivirus detection for URL or domain 2->115 117 10 other signatures 2->117 12 BQvbHU7WJb.exe 16 2->12         started        signatures3 process4 file5 87 C:\Users\user\AppData\...\FFDvbcrdfqs.exe, PE32 12->87 dropped 89 C:\Users\user\AppData\Local\...\Dcvxaamev.exe, PE32 12->89 dropped 131 Contains functionality to steal Internet Explorer form passwords 12->131 133 Maps a DLL or memory area into another process 12->133 16 FFDvbcrdfqs.exe 4 12->16         started        19 Dcvxaamev.exe 4 12->19         started        21 BQvbHU7WJb.exe 12->21         started        signatures6 process7 dnsIp8 105 Maps a DLL or memory area into another process 16->105 24 FFDvbcrdfqs.exe 69 16->24         started        29 Dcvxaamev.exe 191 19->29         started        97 185.225.19.55, 49752, 80 MIVOCLOUDMD Romania 21->97 99 194.180.174.53, 49751, 80 MIVOCLOUDMD unknown 21->99 31 WerFault.exe 23 9 21->31         started        signatures9 process10 dnsIp11 101 prepepe.ac.ug 185.215.113.77, 49750, 49753, 49756 WHOLESALECONNECTIONSNL Portugal 24->101 103 pretorian.ac.ug 24->103 65 C:\Users\user\AppData\Local\Temp\cc.exe, PE32 24->65 dropped 67 C:\Users\user\AppData\Local\Temp\pm.exe, PE32+ 24->67 dropped 69 C:\Users\user\AppData\...\vcruntime140.dll, PE32 24->69 dropped 79 47 other files (none is malicious) 24->79 dropped 119 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->119 121 Tries to steal Instant Messenger accounts or passwords 24->121 123 Tries to steal Mail credentials (via file / registry access) 24->123 129 2 other signatures 24->129 33 cc.exe 24->33         started        37 pm.exe 24->37         started        39 cmd.exe 24->39         started        71 C:\ProgramData\vcruntime140.dll, PE32 29->71 dropped 73 C:\ProgramData\sqlite3.dll, PE32 29->73 dropped 75 C:\ProgramData\softokn3.dll, PE32 29->75 dropped 81 4 other files (none is malicious) 29->81 dropped 125 Tries to harvest and steal browser information (history, passwords, etc) 29->125 127 Tries to steal Crypto Currency Wallets 29->127 41 cmd.exe 29->41         started        77 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 31->77 dropped file12 signatures13 process14 dnsIp15 91 www.uplooder.net 144.76.120.25, 443, 49757, 49758 HETZNER-ASDE Germany 33->91 107 Uses schtasks.exe or at.exe to add and modify task schedules 33->107 109 Injects a PE file into a foreign processes 33->109 43 cc.exe 33->43         started        93 192.168.2.1 unknown unknown 37->93 46 cmd.exe 37->46         started        48 conhost.exe 39->48         started        50 timeout.exe 39->50         started        52 conhost.exe 41->52         started        54 taskkill.exe 41->54         started        signatures16 process17 file18 85 C:\Users\user\AppData\...\fodhelper.exe, PE32 43->85 dropped 56 schtasks.exe 43->56         started        58 pm.exe 46->58         started        61 conhost.exe 46->61         started        process19 file20 63 conhost.exe 56->63         started        83 C:\Users\user\AppData\Roaming\winda.exe, PE32+ 58->83 dropped process21
Threat name:
Win32.Infostealer.Azorult
Status:
Malicious
First seen:
2021-12-10 13:47:12 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:5781468cedb3a203003fdf1f12e72fe98d6f1c0f collection discovery infostealer persistence spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5
Malware Config
C2 Extraction:
prepepe.ac.ug
http://195.245.112.115/index.php
Unpacked files
SH256 hash:
ae7894c28cb6f9a1f55cffaf2594e68088973538026512b1d99826496a835ca2
MD5 hash:
54a71c5cb4767a604682643a505ae9be
SHA1 hash:
eb9c74a1a120204fdb3c8e75c0ff81ce1a0dfeae
Detections:
win_raccoon_auto
SH256 hash:
44e45f9e9753531c3c3f669d73b62f0acd2a0db965b4872fe54481de83cb1922
MD5 hash:
1e3449ee27b460c288ba094318a88282
SHA1 hash:
3d33ef593759cd1d81934296b2d2ce08efd2fb0d
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
680d8a1401e7082a770e59e4c0c720f17313e9f0af7b200bb67f1f489ebcc33a
MD5 hash:
60a63b9099ea24350d789448f88c3b30
SHA1 hash:
6cf6e7b619f4e4213c4b54b46c188326da514725
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
ed58ffee46a583c177c792b56c9fc20ccd9509d125f2e3fc90c4f48de7e2c2a1
MD5 hash:
8f1c8b40c7be588389a8d382040b23bb
SHA1 hash:
bef5209ae90a3bd3171e1e0be4e8148c4ccd8a6a
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe ed58ffee46a583c177c792b56c9fc20ccd9509d125f2e3fc90c4f48de7e2c2a1

(this sample)

Comments