MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments 1

SHA256 hash: f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346
SHA3-384 hash: ac932c845322f2e58a86df82d5f314abf90c19fe92140deddfef99e162eea0c651e32a8387631191f8941a6f4f55bd3a
SHA1 hash: f128c560612c22c30ff0a3593bb66794ae7774d5
MD5 hash: 2354d9753f0f741bd358dae604e48c3e
humanhash: nebraska-victor-friend-delaware
File name:2354d9753f0f741bd358dae604e48c3e
Download: download sample
Signature RaccoonStealer
File size:1'036'288 bytes
First seen:2021-10-22 01:53:34 UTC
Last seen:2021-10-22 03:03:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 38bbd7b6af738c50eec8bb509ccc9556 (3 x RaccoonStealer, 1 x AZORult)
ssdeep 12288:hxt6hRd3GUju9Al4QMe89d18EbVAXMJrQF0p4v9TH9yzsN2j33+RgshWtqU59d3i:hxQhf3DcA78DbVAXWQF0p2hNIeQqU5w1
Threatray 6'758 similar samples on MalwareBazaar
TLSH T14025011A2D7B0563F0054DB10BF096F61BBDFC533492DC1F9B45AA4818E2B8A68D1B7B
Reporter zbetcheckin
Tags:32 exe RaccoonStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346.exe
Verdict:
Malicious activity
Analysis date:
2021-10-22 04:27:20 UTC
Tags:
trojan rat azorult stealer vidar loader raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Connection attempt to an infection source
Launching the default Windows debugger (dwwin.exe)
Creating a file
Reading critical registry keys
Deleting a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Query of malicious DNS domain
Stealing user critical data
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
67%
Tags:
anti-debug anti-vm azorult emotet fareit greyware hacktool obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult Raccoon Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Internet Explorer form passwords
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 507394 Sample: HgtfY0U8I5 Startdate: 22/10/2021 Architecture: WINDOWS Score: 100 42 telegka.top 2->42 44 telegin.top 2->44 50 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->50 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 11 other signatures 2->56 8 HgtfY0U8I5.exe 16 2->8         started        signatures3 process4 file5 34 C:\Users\user\AppData\Local\...\Vtergfds.exe, PE32 8->34 dropped 36 C:\Users\user\AppData\Local\...\Vereransa.exe, PE32 8->36 dropped 58 Contains functionality to steal Internet Explorer form passwords 8->58 60 Maps a DLL or memory area into another process 8->60 12 Vereransa.exe 4 8->12         started        15 Vtergfds.exe 4 8->15         started        17 HgtfY0U8I5.exe 8->17         started        signatures6 process7 dnsIp8 62 Antivirus detection for dropped file 12->62 64 Multi AV Scanner detection for dropped file 12->64 66 Machine Learning detection for dropped file 12->66 20 Vereransa.exe 15 12->20         started        68 Maps a DLL or memory area into another process 15->68 24 Vtergfds.exe 12 15->24         started        38 telegka.top 17->38 40 192.168.2.1 unknown unknown 17->40 signatures9 process10 dnsIp11 26 C:\ProgramData\sqlite3.dll, PE32 20->26 dropped 28 C:\ProgramData\softokn3.dll, PE32 20->28 dropped 30 C:\ProgramData\mozglue.dll, PE32 20->30 dropped 32 C:\ProgramData\freebl3.dll, PE32 20->32 dropped 46 scarsa.ac.ug 185.215.113.77, 49752, 49755, 80 WHOLESALECONNECTIONSNL Portugal 24->46 48 milsom.ac.ug 24->48 file12
Threat name:
Win32.Infostealer.Azorult
Status:
Malicious
First seen:
2021-10-20 18:32:30 UTC
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:b76017a227a0d879dec7c76613918569d03892fb collection discovery infostealer persistence spyware stealer trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
scarsa.ac.ug
Unpacked files
SH256 hash:
f53d7ccac769286e829b9c88987bd89bebdd50ecff09544431f82d120b2f862e
MD5 hash:
aaed5f83a3497b0d0b1b71a2efd6d33c
SHA1 hash:
5fd2a23499fb18ef988d2f9c176eacca0af8b413
Detections:
win_raccoon_auto
SH256 hash:
c02b496ee588e41bb6c2bf8de9b370c32b8b2fc23032a90866e909d31daf6b23
MD5 hash:
d4e3078d4b3624f2bf194f584aadc681
SHA1 hash:
1eefd1707a3f1d87f3525db173a10a3bc7253ff9
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
117a0d3a8cfac2853fc02d97fdc31ba4ec1d22a72f1189c5bc787bf04b415e2e
MD5 hash:
b95690a2a5cc375424e5cd65a0a7bcd2
SHA1 hash:
0a761a689a2b028de35a774c3c8b760ac407f83d
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346
MD5 hash:
2354d9753f0f741bd358dae604e48c3e
SHA1 hash:
f128c560612c22c30ff0a3593bb66794ae7774d5
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe f3be725453067dd4fd33c93d841f8bc707334cad295708f36319294405066346

(this sample)

Comments



Avatar
zbet commented on 2021-10-22 01:53:36 UTC

url : hxxp://backgrounds.pk/zxcv.EXE