MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cc82eba0f92824807acfec362e96c2933cb894e9a220194a3eae627e4007f26. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 16


Intelligence 16 IOCs 1 YARA File information Comments

SHA256 hash: 0cc82eba0f92824807acfec362e96c2933cb894e9a220194a3eae627e4007f26
SHA3-384 hash: 6832bca89a56158860bb9c9d17ca1cde80c8edfb10ac0871268a09a9f4842bb4d081d597409bd5996173e6f7b765d6e9
SHA1 hash: 6836aa4bd01e4f303809573cd18ce4413ae1409c
MD5 hash: d336c845a72545aaa9757225350301ab
humanhash: april-hamper-batman-double
File name:0CC82EBA0F92824807ACFEC362E96C2933CB894E9A220.exe
Download: download sample
Signature Tofsee
File size:4'860'372 bytes
First seen:2022-10-26 00:00:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JD2A81+n4kOkU7XN59PjXSEtnb03Q9VjZpRBozYBRqq2Y:JKv1+n4aUzFOEtwg9p1WY
TLSH T15F26333C27E59E9DD1C50B76CC41C76AEAA2F03E5094C22992D42B24F9A58D2DC1F3F6
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe Tofsee


Avatar
abuse_ch
Tofsee C2:
193.106.191.19:47242

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.106.191.19:47242 https://threatfox.abuse.ch/ioc/948768/

Intelligence


File Origin
# of uploads :
1
# of downloads :
274
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
0CC82EBA0F92824807ACFEC362E96C2933CB894E9A220.exe
Verdict:
Malicious activity
Analysis date:
2022-10-26 00:04:35 UTC
Tags:
evasion raccoon trojan redline opendir socelars stealer rat vidar loader ficker miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
onlyLogger Loader
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Unauthorized injection to a recently created process
Query of malicious DNS domain
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nymaim, Raccoon, RedLine, Socelars, only
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates HTML files with .exe extension (expired dropper behavior)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Sigma detected: Copy itself to suspicious location via type command
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Yara detected Generic Downloader
Yara detected Nymaim
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 730609 Sample: 0CC82EBA0F92824807ACFEC362E... Startdate: 26/10/2022 Architecture: WINDOWS Score: 100 118 www.facebook.com 2->118 120 topniemannpickshop.cc 2->120 122 16 other IPs or domains 2->122 148 Snort IDS alert for network traffic 2->148 150 Multi AV Scanner detection for domain / URL 2->150 152 Malicious sample detected (through community Yara rule) 2->152 154 26 other signatures 2->154 13 0CC82EBA0F92824807ACFEC362E96C2933CB894E9A220.exe 10 2->13         started        signatures3 process4 file5 116 C:\Users\user\AppData\...\setup_installer.exe, PE32 13->116 dropped 16 setup_installer.exe 22 13->16         started        20 mshta.exe 13->20         started        process6 file7 74 C:\Users\user\AppData\...\setup_install.exe, PE32 16->74 dropped 76 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 16->76 dropped 78 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 16->78 dropped 80 17 other files (16 malicious) 16->80 dropped 146 Multi AV Scanner detection for dropped file 16->146 22 setup_install.exe 1 16->22         started        26 cmd.exe 20->26         started        signatures8 process9 dnsIp10 124 127.0.0.1 unknown unknown 22->124 126 s.lletlee.com 22->126 128 mooorni.xyz 22->128 160 Multi AV Scanner detection for dropped file 22->160 162 Performs DNS queries to domains with low reputation 22->162 164 Adds a directory exclusion to Windows Defender 22->164 29 cmd.exe 22->29         started        31 cmd.exe 22->31         started        33 cmd.exe 1 22->33         started        37 15 other processes 22->37 114 C:\Users\user\AppData\Local\Temp\7DLAd.ExE, PE32 26->114 dropped 35 conhost.exe 26->35         started        file11 signatures12 process13 signatures14 40 Tue1360ff6df7802e.exe 4 29 29->40         started        45 Tue1391b92fc6.exe 31->45         started        47 Tue13a68cfd6d0d6.exe 33->47         started        158 Adds a directory exclusion to Windows Defender 37->158 49 Tue131015d5460.exe 37->49         started        51 Tue1352a713d62e.exe 37->51         started        53 Tue135250f4794.exe 37->53         started        55 9 other processes 37->55 process15 dnsIp16 136 14 other IPs or domains 40->136 90 C:\Users\...\yg2fdOHCpMqhahpJ4hHRmbgu.exe, PE32 40->90 dropped 92 C:\Users\...\up8DN77H_A7AmvFeDkT_Ka3V.exe, PE32 40->92 dropped 94 C:\Users\...\sD4GB54kT0c83ruhUNLBjeGr.exe, PE32 40->94 dropped 104 20 other malicious files 40->104 dropped 166 Multi AV Scanner detection for dropped file 40->166 168 May check the online IP address of the machine 40->168 170 Creates HTML files with .exe extension (expired dropper behavior) 40->170 172 Disable Windows Defender real time protection (registry) 40->172 138 4 other IPs or domains 45->138 96 C:\Users\...\oCOWbAgL0eWkrK0_GtIfHVnI.exe, PE32+ 45->96 dropped 98 C:\Users\...\kUff8XOD1ZKHVjoA_VMICZvl.exe, PE32 45->98 dropped 100 C:\Users\...\eaZDGOCIPuCdTk3Jc6fCDIT7.exe, PE32 45->100 dropped 106 20 other malicious files 45->106 dropped 174 Tries to harvest and steal browser information (history, passwords, etc) 45->174 102 C:\Users\user\...\Tue13a68cfd6d0d6.tmp, PE32 47->102 dropped 176 Obfuscated command line found 47->176 57 Tue13a68cfd6d0d6.tmp 47->57         started        140 2 other IPs or domains 49->140 178 Antivirus detection for dropped file 49->178 180 Machine Learning detection for dropped file 49->180 60 WerFault.exe 49->60         started        142 2 other IPs or domains 51->142 182 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 51->182 132 cdn.discordapp.com 162.159.130.233, 443, 49709, 49717 CLOUDFLARENETUS United States 53->132 134 s.lletlee.com 55->134 144 7 other IPs or domains 55->144 184 Sample uses process hollowing technique 55->184 186 Injects a PE file into a foreign processes 55->186 62 explorer.exe 55->62 injected 64 Tue13df8ed732334dc9.exe 55->64         started        file17 188 Connects to a pastebin service (likely for C&C) 134->188 signatures18 process19 file20 108 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 57->108 dropped 110 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 57->110 dropped 112 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 57->112 dropped 66 Tue13a68cfd6d0d6.exe 57->66         started        process21 file22 82 C:\Users\user\...\Tue13a68cfd6d0d6.tmp, PE32 66->82 dropped 156 Obfuscated command line found 66->156 70 Tue13a68cfd6d0d6.tmp 66->70         started        signatures23 process24 dnsIp25 130 propanla.com 209.99.40.222, 49736, 49737, 80 CONFLUENCE-NETWORK-INCVG United States 70->130 84 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 70->84 dropped 86 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 70->86 dropped 88 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 70->88 dropped file26
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2021-10-19 22:48:50 UTC
File Type:
PE (Exe)
Extracted files:
453
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
raccoon
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:nullmixer family:onlylogger family:privateloader family:raccoon family:redline family:smokeloader family:socelars botnet:2f2ad1a1aa093c5a9d17040c8efd5650a99640b5 botnet:fucker2 botnet:media18 aspackv2 backdoor discovery dropper infostealer loader spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
OnlyLogger payload
Detects Smokeloader packer
NullMixer
OnlyLogger
PrivateLoader
Raccoon
RedLine
RedLine payload
SmokeLoader
Socelars
Socelars payload
Malware Config
C2 Extraction:
http://mooorni.xyz/
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
91.121.67.60:2151
135.181.129.119:4805
Unpacked files
SH256 hash:
57357e1d304ed1c4db3d22dbbd6a01327237d1fad37437db58f0a7d97a3d7ba3
MD5 hash:
42c09e2ff1923e01e6b465436b1d176f
SHA1 hash:
6fc4b58ff71392865812ba14a6b469ddec5df7d4
Detections:
win_gcleaner_auto
SH256 hash:
f60bd1658ad05f37e2777cb49ea63588ac24f6e18c3f631d7b11e7a6819e75ed
MD5 hash:
81760d3d0914159e7d6836166efce6bf
SHA1 hash:
15789eee76b780a0bde70071ecb0a738dea445b6
SH256 hash:
03c7096f04ff5c60e9cc2f959fd2b412137ab04e131c54295edf86e6c73a9427
MD5 hash:
93477906b5ba6f5b376b21d4bf810752
SHA1 hash:
7dc227ed554b97276fd3385faa9f9af9cc9da18a
SH256 hash:
51a78b5f1799ffe27a1412e5eaa89e46dc32482e140c46ddafcd4c248e701b07
MD5 hash:
74c38bb6084f0c955a35c2355f6d9bc9
SHA1 hash:
ff3911cf479e9932acbb4148918b1e10e368b13a
SH256 hash:
aad495a72e96f5a551319845a7c49b09144d250528222617e793c18986365b3e
MD5 hash:
877bf51d0dc681ef39e31a6fc03e5fe1
SHA1 hash:
fd934fd0dd367c88e98b785e3d1d1ed712c84058
SH256 hash:
e7e5f8b44e8ca69294edf309b6e6330ccd5e8ec812e3d446058d669ed01e3d61
MD5 hash:
581a78ce2f5310961035a39f847b4d91
SHA1 hash:
f80674d6ab1c0badec27b0859104975465529f94
SH256 hash:
27a9228747973ae9649e8717a2ff77916346560644e734ef2ed946f2767fb128
MD5 hash:
de1b3c28ea026c0ede620dd78199ddc5
SHA1 hash:
ee402371a36bff44c765323ccd8c7e4a56bc8d12
SH256 hash:
d0c2d56e9165d4cf2652a024d6b26bb79529f1e386f1421f739ff8a1fd8407bc
MD5 hash:
2200aa6db56cd0f0dfe1c70947b0c7d9
SHA1 hash:
e71ed1b12e1ae01b70b2175f08719ca5297c51f6
SH256 hash:
d626180356047eff85c36abbc7a1752c4f962d79070ffc7803b8db2af3be9be5
MD5 hash:
26278caf1df5ef5ea045185380a1d7c9
SHA1 hash:
df16e31d1dd45dc4440ec7052de2fc026071286c
SH256 hash:
9da9ff2d6a3df588ede6f3d8b1fa835157b9595021a1d1e1bb7ba8f16c7d7919
MD5 hash:
caca750b7aba4e2d1b8033eae137d3a5
SHA1 hash:
bbdda950acf6883c3ed40925a45aa9d700baee9e
SH256 hash:
87c46f3270f7cecb5b1d2ee881eba4654624e01c7504470c2edd8195ce996535
MD5 hash:
710d007acfefefac0654df0374e60c48
SHA1 hash:
834feacd6e422ae146f128eeb5e48a4aebc6472e
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
4d7bf2038b241cc664c74c6e979f5fe95434613b0e1cfb6484417cb61793ffb9
MD5 hash:
3dab7aa5329772c930838683b5599fec
SHA1 hash:
6ef7d0cdedbd1520c1b346a9467aa5837eca679d
SH256 hash:
fa02543c043d0ca718baf3dfafb7f5d0c018d46ee6e0f0220095e5874f160752
MD5 hash:
0c4602580c43df3321e55647c7c7dfdb
SHA1 hash:
5e4c40d78db55305ac5a30f0e36a2e84f3849cd1
SH256 hash:
2fb5b9fec9447a0f16237dead4a722d211ee1dd479291fdc2451c5f159cf847b
MD5 hash:
167be1d5e310eb8e62c3b93a60ece9e0
SHA1 hash:
4622db8d4e94498ae1d0ad8a03d53f9ec2611cf1
SH256 hash:
174f4f8146a8998395b38774f52063130304ab214257d10badc37464578c8c1d
MD5 hash:
7dc5f09dde69421bd8581b40d994ccd7
SHA1 hash:
23788ae65ec05a9e542636c6c4e1d9d6be26d05c
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
31c5fbbf2c420eec04c859d1de4cc968a521042c89b37259d22860c1f06b82c3
MD5 hash:
3810282ac410423b0677032702a2dceb
SHA1 hash:
13ba7a447efe3900b02ecb2aa17ac23068a56a74
Detections:
win_raccoon_auto
SH256 hash:
f88e2926a7aff6788062ace2d4999d73a4de253d8758c262e7f674088ec4bbde
MD5 hash:
9c27633bcdf8507a59b7a283a3b2b490
SHA1 hash:
102ab66902788948457c3cd715fbd3a2650f1933
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
4aee8a5e848eed52dcb0be8873d404b46ebd2b2cc9ed7746d0c1f72fee7f000b
MD5 hash:
6eedd5552785a5762355d51dc82575b4
SHA1 hash:
d0fdd822453ef3c3250d9256193bfba6ee088389
SH256 hash:
7a98a843f6b9affbce7a5566025ada0c0b91d64a6608248d9bbfeb57a2b432d3
MD5 hash:
e2cb93e8d29a89d70a6e3a67363c0d71
SHA1 hash:
8cf0d828c662ad794d21c851f946f95ec8413e41
SH256 hash:
57534668000d43e68435904053ec12730d937bf42e8df9cb968d339f3c88bb08
MD5 hash:
d5b54054d62962607191306219bd6be8
SHA1 hash:
16a680192de42ab0e3c8233f434e772c0ee5f026
SH256 hash:
0cc82eba0f92824807acfec362e96c2933cb894e9a220194a3eae627e4007f26
MD5 hash:
d336c845a72545aaa9757225350301ab
SHA1 hash:
6836aa4bd01e4f303809573cd18ce4413ae1409c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments