MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa6dd5eb60f0cd975e9429dc2cc97362c542f4fd001d1d99995484215da3377e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: fa6dd5eb60f0cd975e9429dc2cc97362c542f4fd001d1d99995484215da3377e
SHA3-384 hash: b277901aafa3d177fffd201a5eeb96f04fa47452788ec17ad40fe634d9228bf6da1eb6a6f0fb224a7b4528e96a18600c
SHA1 hash: 8ead6435da602add7674c4c85fa6e64c65e7541a
MD5 hash: 4f103b3d193ab688e6595b09ca78c759
humanhash: india-snake-blossom-three
File name:SecuriteInfo.com.Trojan.GenericKD.37660844.26193.32333
Download: download sample
Signature RaccoonStealer
File size:4'758'328 bytes
First seen:2021-09-28 10:15:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5b9290431b366a1252cf05522cb28180 (8 x RaccoonStealer)
ssdeep 98304:Vi0rWB4KuIEoGHKRsH9sXUlkaZRkBqdpmvz6WcO6oxrk+kv:k54Ku2GyXzaQPverIxkv
Threatray 52 similar samples on MalwareBazaar
TLSH T1C2261257E51000E1D0EEC531A5173DD2F6F10A365E41A83AF6DDAAC9EF725D3E202AB2
File icon (PE):PE icon
dhash icon 30f0ccfcf4ccf030 (1 x RaccoonStealer, 1 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe RaccoonStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.GenericKD.37660844.26193.32333
Verdict:
Malicious activity
Analysis date:
2021-09-28 10:19:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Result
Threat name:
Raccoon
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-09-26 12:00:54 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:e060dfc3a49070bbb99d86e33233927af8043736 stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Raccoon
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
a1b7cafe0f3dc662b79164d0a1277040bf3ea714936a25f2d370bc60dc01dc4b
MD5 hash:
f92b5a442e285aaf2ccad81f574deff7
SHA1 hash:
e51c8faa6085af45715365e71cfcd725b4e8b546
SH256 hash:
fa6dd5eb60f0cd975e9429dc2cc97362c542f4fd001d1d99995484215da3377e
MD5 hash:
4f103b3d193ab688e6595b09ca78c759
SHA1 hash:
8ead6435da602add7674c4c85fa6e64c65e7541a
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe fa6dd5eb60f0cd975e9429dc2cc97362c542f4fd001d1d99995484215da3377e

(this sample)

  
Delivery method
Distributed via web download

Comments