MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f7fca90f6099f7abb75bd82e09dd715ce16f313a2f9b413efe1a7da35624fcce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments

SHA256 hash: f7fca90f6099f7abb75bd82e09dd715ce16f313a2f9b413efe1a7da35624fcce
SHA3-384 hash: a76677f69fb67660e3550710c5f3b0a3cce64e095d671a45d47848443795a185fa2adf9e37cdbf08d24886640d747014
SHA1 hash: 5c3eacd5a386e48bb54e1083b3712299df64aaa0
MD5 hash: c6f0be259998c09885625c26063c9b3b
humanhash: arizona-twenty-foxtrot-lion
File name:C6F0BE259998C09885625C26063C9B3B.exe
Download: download sample
Signature RaccoonStealer
File size:285'184 bytes
First seen:2021-09-07 06:26:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1bd9ec7a4dcb0a443d99b482d9f2b78b (9 x RaccoonStealer, 2 x RedLineStealer, 1 x CoinMiner)
ssdeep 6144:HizLwYGGC496XDImbLpFbDI98V5v5uJgFVg8FY6xA:HizMYGGxYXDIwpFQ98Vn/4
Threatray 324 similar samples on MalwareBazaar
TLSH T16B54D0113760B57EE597623847B5DB670B2A6EB16A60C3833607274A1F322C07F26FD6
dhash icon 93f0ec96f6dcd8a3 (1 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://45.142.215.237/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.142.215.237/ https://threatfox.abuse.ch/ioc/216755/

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C6F0BE259998C09885625C26063C9B3B.exe
Verdict:
Malicious activity
Analysis date:
2021-09-07 07:04:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Connection attempt
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Searching for the window
Launching a tool to kill processes
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 478750 Sample: 4rnjlRe7UG.exe Startdate: 07/09/2021 Architecture: WINDOWS Score: 68 19 Antivirus detection for URL or domain 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Machine Learning detection for sample 2->23 7 4rnjlRe7UG.exe 2 2->7         started        process3 dnsIp4 17 cleaner-partners.biz 5.230.68.37, 49703, 80 ASGHOSTNETDE Germany 7->17 25 Detected unpacking (changes PE section rights) 7->25 11 cmd.exe 1 7->11         started        signatures5 process6 process7 13 taskkill.exe 1 11->13         started        15 conhost.exe 11->15         started       
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-09-05 00:44:46 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Deletes itself
Unpacked files
SH256 hash:
de5abf623e5d3066ad49cbf41b3ff96b0b1d0aa523717c3de9c66bfc5b7c5350
MD5 hash:
ab10f62b2842390ec03bc72e02a0479b
SHA1 hash:
5472187d61fb043a3df0fdab6f4ed64eec174529
SH256 hash:
f7fca90f6099f7abb75bd82e09dd715ce16f313a2f9b413efe1a7da35624fcce
MD5 hash:
c6f0be259998c09885625c26063c9b3b
SHA1 hash:
5c3eacd5a386e48bb54e1083b3712299df64aaa0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments