MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 079e8468f9e6f11a839e931ab04d45036acb2574aa37a4f749d6db98a61509cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: 079e8468f9e6f11a839e931ab04d45036acb2574aa37a4f749d6db98a61509cc
SHA3-384 hash: 805dd5c630123ea9c742c5e3bffb7c9ff44b221646e2b2622cc0aa65ed6731e6008cfaf8ddf481c7c38e903588888102
SHA1 hash: 6bfb7ee7cb01ed2e9e50658193847954900f26a5
MD5 hash: 3e83abe805ea3cd0852235f3365e1cf9
humanhash: maine-dakota-emma-oxygen
File name:079E8468F9E6F11A839E931AB04D45036ACB2574AA37A.exe
Download: download sample
Signature DiamondFox
File size:3'500'618 bytes
First seen:2021-09-01 11:35:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBfxD1zheQnY4So8DiYJnmlJxqqWkDpyZvVivHtlJp/k3EwJ84vLRaBtIl9mT0C:xQ18QgiBlJxzW3ZWtlPcUCvLUBsKS2
Threatray 458 similar samples on MalwareBazaar
TLSH T18AF53314B2E6C2F7CA8251719C092FB2E0B9E39D1732489323605B1F1DAFD25936E9D7
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://45.142.215.144/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.142.215.144/ https://threatfox.abuse.ch/ioc/204183/

Intelligence


File Origin
# of uploads :
1
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Moving a file to the %temp% subdirectory
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Result
Threat name:
Backstage Stealer Nitol RedLine SmokeLoa
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Backstage Stealer
Yara detected Nitol
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 475714 Sample: 079E8468F9E6F11A839E931AB04... Startdate: 01/09/2021 Architecture: WINDOWS Score: 100 164 Antivirus detection for URL or domain 2->164 166 Multi AV Scanner detection for dropped file 2->166 168 Multi AV Scanner detection for submitted file 2->168 170 13 other signatures 2->170 11 079E8468F9E6F11A839E931AB04D45036ACB2574AA37A.exe 14 2->11         started        process3 file4 78 C:\Users\user\AppData\...\setup_install.exe, PE32 11->78 dropped 80 C:\Users\user\AppData\Local\...\sotema_6.txt, PE32 11->80 dropped 82 C:\Users\user\AppData\Local\...\sotema_5.txt, PE32 11->82 dropped 84 9 other files (none is malicious) 11->84 dropped 14 setup_install.exe 1 11->14         started        process5 dnsIp6 156 192.64.119.193 NAMECHEAP-NETUS United States 14->156 158 127.0.0.1 unknown unknown 14->158 118 C:\Users\user\AppData\...\sotema_5.exe (copy), PE32 14->118 dropped 120 C:\Users\user\AppData\...\sotema_2.exe (copy), PE32 14->120 dropped 122 C:\Users\user\AppData\...\sotema_6.exe (copy), PE32 14->122 dropped 124 3 other files (none is malicious) 14->124 dropped 160 Detected unpacking (changes PE section rights) 14->160 162 Machine Learning detection for dropped file 14->162 19 cmd.exe 1 14->19         started        21 cmd.exe 1 14->21         started        23 cmd.exe 1 14->23         started        25 5 other processes 14->25 file7 signatures8 process9 process10 27 sotema_5.exe 61 19->27         started        32 sotema_1.exe 5 21->32         started        34 sotema_2.exe 1 23->34         started        36 sotema_4.exe 1 1 25->36         started        38 sotema_6.exe 2 25->38         started        40 sotema_3.exe 12 25->40         started        dnsIp11 142 136.144.41.133 WORLDSTREAMNL Netherlands 27->142 144 136.144.41.201 WORLDSTREAMNL Netherlands 27->144 152 13 other IPs or domains 27->152 102 C:\Users\...\yRRycjGGgY2pScJ7TaIlyi_X.exe, PE32 27->102 dropped 104 C:\Users\...\xQgRp54g3dIh5sxN7UHU5dbZ.exe, PE32 27->104 dropped 106 C:\Users\...\wPe1VxnTWE8SDgIh1mkQNIn7.exe, PE32 27->106 dropped 116 36 other files (31 malicious) 27->116 dropped 186 Drops PE files to the document folder of the user 27->186 188 Creates HTML files with .exe extension (expired dropper behavior) 27->188 190 Disable Windows Defender real time protection (registry) 27->190 42 1d5Ozr7FT50YKvlASZsvVszO.exe 27->42         started        59 2 other processes 27->59 108 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 32->108 dropped 47 rundll32.exe 3 32->47         started        110 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 34->110 dropped 192 DLL reload attack detected 34->192 194 Renames NTDLL to bypass HIPS 34->194 196 Maps a DLL or memory area into another process 34->196 198 Checks if the current machine is a virtual machine (disk enumeration) 34->198 49 explorer.exe 34->49 injected 146 208.95.112.1 TUT-ASUS United States 36->146 148 8.8.8.8 GOOGLEUS United States 36->148 154 3 other IPs or domains 36->154 112 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 36->112 dropped 51 jfiag3g_gg.exe 36->51         started        53 jfiag3g_gg.exe 36->53         started        61 4 other processes 36->61 114 C:\Users\user\AppData\Local\...\sotema_6.tmp, PE32 38->114 dropped 55 sotema_6.tmp 38->55         started        150 74.114.154.18 AUTOMATTICUS Canada 40->150 57 WerFault.exe 40->57         started        file12 signatures13 process14 dnsIp15 140 2 other IPs or domains 42->140 86 C:\Users\user\AppData\Local\...\wFaxU5RO.com, PE32+ 42->86 dropped 88 C:\Users\user\AppData\Local\...\dursn263.com, PE32 42->88 dropped 90 C:\Users\user\AppData\Local\...\33cAvdQp.com, PE32 42->90 dropped 92 C:\ProgramData\delivery_club\delivery.exe, PE32+ 42->92 dropped 174 Drops PE files with a suspicious file extension 42->174 176 Contains functionality to infect the boot sector 47->176 178 Contains functionality to inject threads in other processes 47->178 180 Contains functionality to inject code into remote processes 47->180 184 5 other signatures 47->184 63 svchost.exe 47->63 injected 66 svchost.exe 47->66 injected 68 svchost.exe 47->68 injected 70 5 other processes 47->70 182 Tries to harvest and steal browser information (history, passwords, etc) 51->182 128 192.168.2.1 unknown unknown 53->128 130 194.163.135.248 NEXINTO-DE Germany 55->130 132 185.227.110.219 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 55->132 94 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 55->94 dropped 96 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 55->96 dropped 98 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 55->98 dropped 134 52.168.117.173 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 57->134 136 94.140.114.57 NANO-ASLV Latvia 59->136 138 88.119.171.126 IST-ASLT Lithuania 59->138 100 C:\Users\...\XTwn1hOeridYvRJ22nSR3svz.tmp, PE32 59->100 dropped file16 signatures17 process18 signatures19 200 Sets debug register (to hijack the execution of another thread) 63->200 202 Modifies the context of a thread in another process (thread injection) 63->202 72 svchost.exe 63->72         started        76 svchost.exe 63->76         started        process20 dnsIp21 126 198.13.62.186 AS-CHOOPAUS United States 72->126 172 Query firmware table information (likely to detect VMs) 72->172 signatures22
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-06-26 00:27:50 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:vidar botnet:706 botnet:bratanchikaye botnet:norman2 botnet:spnewportspectr aspackv2 backdoor discovery dropper evasion infostealer loader stealer suricata themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
https://sergeevih43.tumblr.com/
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
45.14.49.232:63850
45.14.49.184:27587
135.148.139.222:1594
Dropper Extraction:
https://kmsauto.us/1/fix.txt
https://ia601409.us.archive.org/7/items/fixmix_fix_4348843584358435/fixmix_fix_4348843584358435.txt
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
91c3938f8f907e2736a829ada89ae22471ebf464b971f45ebac9cbd5fcb9890f
MD5 hash:
a1c636ef83b200ca7ca1be84a896f2c7
SHA1 hash:
f371d08a15d6ba6392e554e2b1fb0ab4f8db1f2a
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
10a122bd647c88aa23f96687e26b251862e83be9dbb89532f4a578689547972d
MD5 hash:
89c739ae3bbee8c40a52090ad0641d31
SHA1 hash:
d0f7dc9a0a3e52af0f9f9736f26e401636c420a1
SH256 hash:
1867e84c30240cc2834f75f38ba3e34ea28ee287128ed694039be7b38a4bde0c
MD5 hash:
f7358e0eb2be6f33b7b472216a1b9af9
SHA1 hash:
809f6e6f7cb8d9333a16126221f1bc291fd09477
SH256 hash:
ba2e7b2b3be8430306f3f4c6ed3e16e9d11787e3e9ae00ceb58a790602e8d065
MD5 hash:
72b50ef11d6af5f78130843b725774d9
SHA1 hash:
6bc06fa5204c0d601304cad54275ab2c5d6396e0
SH256 hash:
d43979eb205824fed0c5c37b95d93d090268ecde76e1ba2cb6b67733b0592c62
MD5 hash:
96af2c79a790d9fae18c6caffd2a9aff
SHA1 hash:
4b0fed687fb10a3d10f9812969e6da0586b790c4
SH256 hash:
9c48008cfb68e0a641dbe14c8853b385498a3695a744cc619289c61bc33d35c1
MD5 hash:
96264268ac6a5f1986a4ebcf342afd97
SHA1 hash:
05c0109ce9e3bcbdc6f5fe6d762863b71ed7be9a
SH256 hash:
079e8468f9e6f11a839e931ab04d45036acb2574aa37a4f749d6db98a61509cc
MD5 hash:
3e83abe805ea3cd0852235f3365e1cf9
SHA1 hash:
6bfb7ee7cb01ed2e9e50658193847954900f26a5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments