MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0c8ad3a0485e2edad4d5cdde99d34434d79233c131edd06e6efa25f8bc86037e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 6 File information Comments

SHA256 hash: 0c8ad3a0485e2edad4d5cdde99d34434d79233c131edd06e6efa25f8bc86037e
SHA3-384 hash: ff0e4ba26ebd82a699151f3a42c14fc3cda523fa71519d5abfcad5e53f22f21406d26785d80bbf788831190e716c9919
SHA1 hash: 91157e08154f6761d400d1b7b380202127c7c89d
MD5 hash: ad9efa458ada665935b0bf189f8f75ee
humanhash: blossom-cola-stream-autumn
File name:ad9efa458ada665935b0bf189f8f75ee.exe
Download: download sample
Signature Adware.FileTour
File size:4'519'591 bytes
First seen:2021-06-07 09:15:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xhCvLUBsgUlRu2tQVdZs4GX4IpwNvrRM9QsL1ebAd+SHeOEo4A:xqLUCgUf5tQdO4GXDwNveL1mAdReOEob
Threatray 36 similar samples on MalwareBazaar
TLSH F126336432D588FAE6A31234AE8D0F7740F9D3C4167641A36BA0CF5DFF71A29D12E648
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
157.90.251.148:53294

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
157.90.251.148:53294 https://threatfox.abuse.ch/ioc/72120/

Intelligence


File Origin
# of uploads :
1
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ad9efa458ada665935b0bf189f8f75ee.exe
Verdict:
No threats detected
Analysis date:
2021-06-07 09:18:51 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Sending a UDP request
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates files with lurking names (e.g. Crack.exe)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Double Extension
Sigma detected: Suspicious Svchost Process
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 430377 Sample: e90fG4wc41.exe Startdate: 07/06/2021 Architecture: WINDOWS Score: 100 163 217.107.34.191 RTCOMM-ASRU Russian Federation 2->163 165 8.211.6.12 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 2->165 167 198.13.62.186 AS-CHOOPAUS United States 2->167 179 Multi AV Scanner detection for domain / URL 2->179 181 Found malware configuration 2->181 183 Antivirus detection for URL or domain 2->183 185 12 other signatures 2->185 12 e90fG4wc41.exe 16 2->12         started        signatures3 process4 file5 123 C:\Users\user\AppData\...\setup_install.exe, PE32 12->123 dropped 125 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 12->125 dropped 127 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 12->127 dropped 129 11 other files (6 malicious) 12->129 dropped 15 setup_install.exe 1 12->15         started        process6 dnsIp7 171 8.8.8.8 GOOGLEUS United States 15->171 173 104.21.92.229 CLOUDFLARENETUS United States 15->173 175 127.0.0.1 unknown unknown 15->175 177 Detected unpacking (changes PE section rights) 15->177 19 cmd.exe 1 15->19         started        21 cmd.exe 1 15->21         started        23 cmd.exe 1 15->23         started        25 8 other processes 15->25 signatures8 process9 process10 27 metina_4.exe 2 19->27         started        31 metina_8.exe 21->31         started        33 metina_7.exe 14 17 23->33         started        36 metina_2.exe 1 25->36         started        38 metina_5.exe 25->38         started        40 metina_1.exe 12 25->40         started        42 2 other processes 25->42 dnsIp11 105 C:\Users\user\AppData\Local\...\metina_4.tmp, PE32 27->105 dropped 207 Antivirus detection for dropped file 27->207 44 metina_4.tmp 27->44         started        107 C:\Users\user\AppData\Local\...\Crack.exe, PE32 31->107 dropped 109 C:\Users\user\AppData\...109Memo2Setp.exe, PE32 31->109 dropped 209 Creates files with lurking names (e.g. Crack.exe) 31->209 48 Crack.exe 31->48         started        143 89.221.213.3 WEDOSCZ Czech Republic 33->143 145 77.246.144.82 THEFIRST-ASRU Russian Federation 33->145 151 5 other IPs or domains 33->151 111 C:\Users\...\SGV1Z57FNHVWC41RCHJ8PJ3J.exe, PE32 33->111 dropped 113 C:\Users\...\UR8LFNZXYKTT9FR7RK939T3Z.exe, PE32 33->113 dropped 121 12 other files (none is malicious) 33->121 dropped 211 Machine Learning detection for dropped file 33->211 50 cmd.exe 33->50         started        52 cmd.exe 33->52         started        63 12 other processes 33->63 115 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 36->115 dropped 213 DLL reload attack detected 36->213 215 Renames NTDLL to bypass HIPS 36->215 217 Checks if the current machine is a virtual machine (disk enumeration) 36->217 54 explorer.exe 36->54 injected 147 208.95.112.1 TUT-ASUS United States 38->147 149 88.99.66.31 HETZNER-ASDE Germany 38->149 153 3 other IPs or domains 38->153 117 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 38->117 dropped 56 jfiag3g_gg.exe 38->56         started        59 jfiag3g_gg.exe 38->59         started        155 2 other IPs or domains 40->155 119 C:\Users\user\AppData\...119ewtonsoft.Json.dll, PE32 42->119 dropped 61 rundll32.exe 42->61         started        file12 signatures13 process14 dnsIp15 169 198.54.126.101 NAMECHEAP-NETUS United States 44->169 131 C:\Users\user\...\djhdfu_____________.exe, PE32 44->131 dropped 133 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 44->133 dropped 135 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 44->135 dropped 137 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 44->137 dropped 65 djhdfu_____________.exe 44->65         started        139 C:\Users\user\AppData\Local\...\install.dll, PE32 48->139 dropped 141 C:\Users\user\AppData\...\adobe_caps.dll, PE32 48->141 dropped 70 rundll32.exe 48->70         started        72 conhost.exe 48->72         started        74 SGV1Z57FNHVWC41RCHJ8PJ3J.exe 50->74         started        76 conhost.exe 50->76         started        78 6BDTJ8189L0Y562SPO423G84.exe 52->78         started        80 conhost.exe 52->80         started        205 Tries to harvest and steal browser information (history, passwords, etc) 56->205 82 UR8LFNZXYKTT9FR7RK939T3Z.exe 63->82         started        84 13 other processes 63->84 file16 signatures17 process18 dnsIp19 157 198.54.116.159 NAMECHEAP-NETUS United States 65->157 159 162.0.210.44 ACPCA Canada 65->159 161 162.0.220.187 ACPCA Canada 65->161 89 C:\Users\user\AppData\...\Wuhaelunexo.exe, PE32 65->89 dropped 91 C:\Users\user\AppData\...91uqofabupo.exe, PE32 65->91 dropped 93 C:\Program Files (x86)\...\Xoxushaqiqi.exe, PE32 65->93 dropped 103 4 other files (3 malicious) 65->103 dropped 187 Detected unpacking (overwrites its own PE header) 65->187 189 Creates autostart registry keys with suspicious values (likely registry only malware) 65->189 191 Writes to foreign memory regions 70->191 193 Allocates memory in foreign processes 70->193 195 Creates a thread in another existing process (thread injection) 70->195 86 svchost.exe 70->86 injected 197 Sample uses process hollowing technique 74->197 199 Injects a PE file into a foreign processes 74->199 95 C:\Program Files (x86)\...\DDqjn8gbt7vt.exe, PE32 78->95 dropped 97 C:\Program Files (x86)\...\Uninstall.exe, PE32 78->97 dropped 99 C:\Program Files (x86)\Browzar\Browzar.exe, PE32 78->99 dropped 101 C:\Users\user\...\AccessibleHandler.dll, PE32+ 82->101 dropped file20 signatures21 process22 signatures23 201 Sets debug register (to hijack the execution of another thread) 86->201 203 Modifies the context of a thread in another process (thread injection) 86->203
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-01 11:24:24 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:plugx family:redline family:smokeloader family:vidar aspackv2 backdoor discovery dropper evasion infostealer loader persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
VMProtect packed file
Glupteba
Glupteba Payload
MetaSploit
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Unpacked files
SH256 hash:
b0db2125ca1e06878a03c3051e459532cf9f61a7266ed11ec5c30ea63558aa46
MD5 hash:
d96d1e3735bfb894fbb14533b1b85886
SHA1 hash:
e97e1648609e47314e3a3431a11bc25ad4b30b73
SH256 hash:
dd76dacb4cf77726e95ed79f9ca5a56e878da89902c0eacb7c146e40122549b3
MD5 hash:
c4d8e5ea0d18d418c41145116ff52fe4
SHA1 hash:
00fe4def6d8e3a9fbec9ca61096d5457804dcf12
SH256 hash:
0edfac6be11732ddd99db66821ee47408c2dc1e9bed68e5ef9a8e130c565b79b
MD5 hash:
cbd6029abaa8e977d3b7435c6f70dd0e
SHA1 hash:
ebb89d4d7659ef77b658a86ad00dba0ead869f4c
SH256 hash:
9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc
MD5 hash:
957460132c11b2b5ea57964138453b00
SHA1 hash:
12e46d4c46feff30071bf8b0b6e13eabba22237f
SH256 hash:
664003cbe6a433ee57676929e973a5efe2644429ceeb348323ff70ed93e94d1e
MD5 hash:
890a74f18cc8b987518fe98e44c7b486
SHA1 hash:
af1381401d6ff9a3c7469ffad2fd5838890a4d95
SH256 hash:
01808f7bce25db18bce99e432555fcfff148a1d931128edebc816975145cabd7
MD5 hash:
5e6df381ce1c9102799350b7033e41df
SHA1 hash:
f8a4012c9547d9bb2faecfba75fc69407aaec288
SH256 hash:
b26d99296cc1f38ad735c36a305eb206b8a9022e92b463886ed918f42dee0b04
MD5 hash:
9decb9ebf19e4e45bd75f175140e1018
SHA1 hash:
c9d35d2bc78dd37270dbe17f2555324c6f560d11
SH256 hash:
b83a3f1d52c264c505a24d96946aa60ae043568adf4cb3199382b1bcf4f7b58f
MD5 hash:
f2d6d33b2e56bde73afb7082d13911d9
SHA1 hash:
d4f4a0ef3cad7e03c66635b401e1dff4d5641893
SH256 hash:
51b0c574eba1d8d47c0a5187ea24d6d04e2a21f14d61d8d86f7c18e47979329d
MD5 hash:
81c1a76c692ba9fcdd9653fb3d282341
SHA1 hash:
9908b6e6e9d622679bc481b934c91e4521c8226d
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
f6b8b44e47658ee410c33a86b340ba0e6eadeae1b276feb947406b50c1ac804c
MD5 hash:
ea2b9402fa612abd3cc1418cad0a4644
SHA1 hash:
3ea4426b7dbc47063ab6eee8a6c6b22762c30ace
SH256 hash:
3b61abbda25ca8655f110896427aee2ef825f247b30df92e404feeb2915d4d32
MD5 hash:
451a627b22bcba0a8b8c59b9e6b89ec3
SHA1 hash:
33f9a0417b7d5c2dffef57a21c3ebfd1bd32ca20
SH256 hash:
16475b2a669b3861115e4d166097006d9a523b4e73be8446efc166fdee8174f3
MD5 hash:
6024b3fd3069c2492fdc0b22626cf78c
SHA1 hash:
2e2ca98c9e2f9f8b41557c1bda11fc27ff8f5804
SH256 hash:
08e7bd0f28b7ce09922bf6551be3475075594da2343352dfa547b2dc601603e5
MD5 hash:
86e3a2e9d9bf3df4d5fec1f0b7074b02
SHA1 hash:
2315e22fe1fe767a29f4e98844c9307019075803
SH256 hash:
3b525e40f2527bc0f960436be192094f40177dcf7296aaf6c34a6241fe023fa8
MD5 hash:
5875fa588354cd2336c0bfcf1941c283
SHA1 hash:
1869d91acb9b958f24ef65ecc79bdf2f72ea0066
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
7704c4712c432db0c9b9e57ca1c15a3b5d2072cf3ede04b671a92c196f46172e
MD5 hash:
a7e4bfacf721b725d39fa023e0130200
SHA1 hash:
682718ecdbad703fa5f132b57c6f6da87f7eaf42
SH256 hash:
fced8a5ad324b478f3ca1de3a1f7c67847851aed64e7e2576b2ab49aecdc22a7
MD5 hash:
46845a914d94a9beeba2415561c4a690
SHA1 hash:
0d1f8347f1ef8df415e2a1ff70f79bbbafd39a38
SH256 hash:
d6be122f76abf7bfeec77d45a1e26daa0fb34d1ae4a1ae37224f27b3e2998832
MD5 hash:
0622d74ccb0fe2658fe4d26185f25b37
SHA1 hash:
267685c6dbb83d8c9c952c23ab275e306d14cdeb
SH256 hash:
bd724fb6f989e7761230598a983544ecacc9fdfa3f347084e0a5d3f4042053e8
MD5 hash:
6eb7a85fdfc356b6cf03277b870a29ba
SHA1 hash:
f0cd81ce71183d069d57feee142af8a6451372d6
SH256 hash:
22ac7aa0bfb52722ccf7786c3f647f7abcff0d88a98b8ac6bf11c3ffe403ebd0
MD5 hash:
234f490ff1fd1fbb01e4a605ac072ba4
SHA1 hash:
60e0afef747f4fea2f7645bcb5a62a04a1f161ea
SH256 hash:
431589709ad3ebc12287445cd1e9e984777f04173de4c168d480eafb617b198b
MD5 hash:
ac5c3787b7001a0fd04206e561346dc9
SHA1 hash:
13d5f6b056af34056fbcde1d638c092d9b6ae2d0
SH256 hash:
47402f7c97422dcaf2294ba76cea210e3ea8c5fbb8b381fdd587771ba20c98f6
MD5 hash:
54461d4c2663a796864285823875bdc7
SHA1 hash:
39e40b48174d0783467e7008074c0e9d053100e4
SH256 hash:
0c8ad3a0485e2edad4d5cdde99d34434d79233c131edd06e6efa25f8bc86037e
MD5 hash:
ad9efa458ada665935b0bf189f8f75ee
SHA1 hash:
91157e08154f6761d400d1b7b380202127c7c89d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments