MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19e98771fa63687f7b8e9359b9c50c8a127e61b82397407ae1d7a03d4b7da414. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 10


Intelligence 10 IOCs 3 YARA 6 File information Comments

SHA256 hash: 19e98771fa63687f7b8e9359b9c50c8a127e61b82397407ae1d7a03d4b7da414
SHA3-384 hash: a741d4d764a4ca62cafd5fb017b28ba5d5643b3609c167a0e02cab4aa2f27345858f994c8e68e7bff5381a1201a18f89
SHA1 hash: b12d546dd20a8fff1352517cf654153aad6e5528
MD5 hash: 70210bd4707c051f84fb0c770b968865
humanhash: mexico-sierra-eight-crazy
File name:70210BD4707C051F84FB0C770B968865.exe
Download: download sample
Signature DiamondFox
File size:5'085'954 bytes
First seen:2021-06-18 21:05:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e7f9a29f2c85394521a08b9f31f6275 (278 x GuLoader, 44 x RemcosRAT, 40 x VIPKeylogger)
ssdeep 98304:Jl5Pi396Hjee6FeFTOgvaNjtdoeZP+7aZ7U+p/HSytuGyhme5thi:Jl509Gqe3Fi4MBhP+7ae+hSYuwezk
Threatray 59 similar samples on MalwareBazaar
TLSH 23363370B510C23DDAB4023DB2DF1E179D8A94DB3EF5A5FBD9E5D785BA02820E126702
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://kiydbi52.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://kiydbi52.top/index.php https://threatfox.abuse.ch/ioc/136298/
http://morunx05.top/index.php https://threatfox.abuse.ch/ioc/136300/
185.215.113.64:8765 https://threatfox.abuse.ch/ioc/136626/

Intelligence


File Origin
# of uploads :
1
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
70210BD4707C051F84FB0C770B968865.exe
Verdict:
No threats detected
Analysis date:
2021-06-18 21:08:04 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates files with lurking names (e.g. Crack.exe)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 436982 Sample: zsaIpokeUX.exe Startdate: 18/06/2021 Architecture: WINDOWS Score: 100 199 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->199 201 Multi AV Scanner detection for domain / URL 2->201 203 Found malware configuration 2->203 205 15 other signatures 2->205 12 zsaIpokeUX.exe 9 2->12         started        15 explorer.exe 2->15         started        process3 file4 139 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->139 dropped 17 setup_installer.exe 16 12->17         started        process5 file6 87 C:\Users\user\AppData\...\setup_install.exe, PE32 17->87 dropped 89 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 17->89 dropped 91 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 17->91 dropped 93 11 other files (4 malicious) 17->93 dropped 20 setup_install.exe 1 17->20         started        process7 dnsIp8 157 razino.xyz 172.67.213.185, 49724, 80 CLOUDFLARENETUS United States 20->157 159 127.0.0.1 unknown unknown 20->159 235 Detected unpacking (changes PE section rights) 20->235 237 Performs DNS queries to domains with low reputation 20->237 24 cmd.exe 20->24         started        26 cmd.exe 1 20->26         started        28 cmd.exe 1 20->28         started        30 6 other processes 20->30 signatures9 process10 process11 32 metina_6.exe 24->32         started        37 metina_1.exe 8 26->37         started        39 metina_5.exe 28->39         started        41 metina_3.exe 87 30->41         started        43 metina_2.exe 1 30->43         started        45 metina_4.exe 3 2 30->45         started        47 2 other processes 30->47 dnsIp12 141 jom.diregame.live 32->141 143 136.144.41.152, 49726, 80 WORLDSTREAMNL Netherlands 32->143 151 10 other IPs or domains 32->151 95 C:\Users\...\w9aqVv2zcn1zrC53qJGe8i6O.exe, PE32 32->95 dropped 97 C:\Users\...\txJZ_pTMejYMCaOfmnUROQ27.exe, PE32 32->97 dropped 103 25 other files (18 malicious) 32->103 dropped 207 Drops PE files to the document folder of the user 32->207 209 Creates HTML files with .exe extension (expired dropper behavior) 32->209 211 Performs DNS queries to domains with low reputation 32->211 213 Disable Windows Defender real time protection (registry) 32->213 49 pMGzDk0Fr1zv60xretfmrlyS.exe 32->49         started        52 CpdJns1zdxuKeAwwdEUvkYk1.exe 32->52         started        55 CGQUAixacYDhNd_Np7UmV6u7.exe 32->55         started        68 7 other processes 32->68 105 4 other files (1 malicious) 37->105 dropped 58 rundll32.exe 37->58         started        99 C:\Users\user\AppData\Local\...\metina_5.tmp, PE32 39->99 dropped 60 metina_5.tmp 39->60         started        145 159.69.20.131, 49760, 80 HETZNER-ASDE Germany 41->145 147 bandakere.tumblr.com 74.114.154.18, 443, 49758 AUTOMATTICUS Canada 41->147 107 12 other files (none is malicious) 41->107 dropped 215 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 41->215 217 Tries to harvest and steal browser information (history, passwords, etc) 41->217 219 Tries to steal Crypto Currency Wallets 41->219 101 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 43->101 dropped 221 DLL reload attack detected 43->221 223 Renames NTDLL to bypass HIPS 43->223 225 Checks if the current machine is a virtual machine (disk enumeration) 43->225 149 ip-api.com 208.95.112.1, 49725, 80 TUT-ASUS United States 45->149 153 3 other IPs or domains 45->153 109 2 other files (1 malicious) 45->109 dropped 227 May check the online IP address of the machine 45->227 62 jfiag3g_gg.exe 45->62         started        64 jfiag3g_gg.exe 45->64         started        111 2 other malicious files 47->111 dropped 229 Creates files with lurking names (e.g. Crack.exe) 47->229 231 Injects a PE file into a foreign processes 47->231 66 metina_8.exe 47->66         started        file13 signatures14 process15 dnsIp16 175 Query firmware table information (likely to detect VMs) 49->175 177 Tries to detect sandboxes and other dynamic analysis tools (window names) 49->177 179 Hides threads from debuggers 49->179 181 Tries to detect sandboxes / dynamic malware analysis system (registry check) 49->181 113 C:\Program Files (x86)\...\md8_8eus.exe, PE32 52->113 dropped 115 C:\Program Files (x86)\Company\...\jooyu.exe, PE32 52->115 dropped 117 C:\Program Files (x86)\...\jingzhang.exe, PE32 52->117 dropped 129 2 other files (1 malicious) 52->129 dropped 171 8.209.115.89 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 55->171 183 Detected unpacking (changes PE section rights) 55->183 185 Detected unpacking (overwrites its own PE header) 55->185 187 Writes to foreign memory regions 58->187 189 Allocates memory in foreign processes 58->189 191 Creates a thread in another existing process (thread injection) 58->191 70 svchost.exe 58->70         started        173 superstationcity.com 5.196.8.173, 49752, 80 OVHFR France 60->173 119 C:\Users\user\AppData\Local\...\(Diadora).exe, PE32 60->119 dropped 121 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 60->121 dropped 123 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 60->123 dropped 125 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 60->125 dropped 74 (Diadora).exe 60->74         started        193 Tries to harvest and steal browser information (history, passwords, etc) 62->193 77 WerFault.exe 66->77         started        127 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 68->127 dropped 195 Sample uses process hollowing technique 68->195 197 Injects a PE file into a foreign processes 68->197 79 conhost.exe 68->79         started        81 conhost.exe 68->81         started        file17 signatures18 process19 dnsIp20 161 192.168.2.1 unknown unknown 70->161 239 System process connects to network (likely due to code injection or exploit) 70->239 241 Sets debug register (to hijack the execution of another thread) 70->241 243 Modifies the context of a thread in another process (thread injection) 70->243 83 svchost.exe 70->83         started        163 198.54.116.159 NAMECHEAP-NETUS United States 74->163 165 173.222.108.210 AKAMAI-ASN1EU United States 74->165 169 2 other IPs or domains 74->169 131 C:\Program Files (x86)\...\Tyshacozhory.exe, PE32 74->131 dropped 133 C:\...\Tyshacozhory.exe.config, XML 74->133 dropped 135 C:\Users\user\AppData\...\Lawenylezha.exe, PE32 74->135 dropped 137 2 other files (none is malicious) 74->137 dropped 245 Detected unpacking (overwrites its own PE header) 74->245 167 13.88.21.125 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 77->167 247 Tries to evade analysis by execution special instruction which cause usermode exception 77->247 file21 signatures22 process23 dnsIp24 155 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 83->155 233 Query firmware table information (likely to detect VMs) 83->233 signatures25
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-06-15 18:43:24 UTC
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:plugx family:redline family:smokeloader family:vidar aspackv2 backdoor dropper evasion infostealer loader persistence stealer themida trojan upx
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Script User-Agent
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
PlugX
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Unpacked files
SH256 hash:
753b02fff3b6da0de94729ced4e416945ace669005bc824ddf5ba00ba995fbd1
MD5 hash:
2d030aeabd05ee82e02e1a428c80a216
SHA1 hash:
436f7f55a7cd157351db63c8ff549cd24232152f
SH256 hash:
7d949047a33a4c10a5e856fb7a019f90ba672aed7d3a8eebf7904253e92a6a9c
MD5 hash:
332fc55d7c5718ef66649be271546061
SHA1 hash:
30b68fb3996a1302ab1d0af4c1980a5544c4e102
Detections:
win_vidar_auto
SH256 hash:
cec7a92e19c44c5cbf66de2ceda993c29d88a60fccb20cf170611725887a2626
MD5 hash:
d5b43b52e76ed607e77062961b01d27b
SHA1 hash:
7fb32d68fd04a49373840f73ea94a020b11d2616
SH256 hash:
01808f7bce25db18bce99e432555fcfff148a1d931128edebc816975145cabd7
MD5 hash:
5e6df381ce1c9102799350b7033e41df
SHA1 hash:
f8a4012c9547d9bb2faecfba75fc69407aaec288
SH256 hash:
b26d99296cc1f38ad735c36a305eb206b8a9022e92b463886ed918f42dee0b04
MD5 hash:
9decb9ebf19e4e45bd75f175140e1018
SHA1 hash:
c9d35d2bc78dd37270dbe17f2555324c6f560d11
SH256 hash:
f155f9ab4f9ec1bed374b2519a203b8c044cf119ba8f07b32e37302cbea53ad8
MD5 hash:
55e6075442439cd1af22f4c31f45074b
SHA1 hash:
7d6e5d21b5308e294f01298c9e2b08be4d7e9a99
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
f9c807b2a0fa1f369ff8632d82da156cab75434e6784721b25ce2dfca3057071
MD5 hash:
79b4e19cc64ae1298e07a9bce03685ea
SHA1 hash:
67a2ef28606116fbea641125b571f207b4d71b75
SH256 hash:
10c09675e3d151f4e7838c9f8db3d7c697e3a42a588c19f035d0e6d153e7814c
MD5 hash:
da21dc2c3c077a7446ed27224a50bf72
SHA1 hash:
5be4ab58bdc3deb1655cccf5d614f65b25f9b00e
SH256 hash:
c5e131696925548cec701576c7060139a40616138a95001c86f5cf92bf1393a4
MD5 hash:
3c34bd9592e7d7fc8bad1d1edda28141
SHA1 hash:
4b04d7f45fde666fc1f665341da0d90a0eb41fe8
SH256 hash:
a7207a8093526a363bc46be55efd73c9b823e28817f1292889c4edb7d5429e0a
MD5 hash:
9ad22a7028f3fd083b0e8c52a1adf3b6
SHA1 hash:
3a71172439ea0e02eeff6bec0da753a35c661adb
SH256 hash:
b5ed957dec2d7d51b53481efd83ef73c904bdbff07a9b3466ba73afb16c566e8
MD5 hash:
4ddad0d6c60d8b8785e01d3e05172fbc
SHA1 hash:
12378b4b0232943af30c91516d1b527d03bc9d0d
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
ef3c9b49315640ab3d0ff3f0a310c3dded0e3b85fc4fc0bf35b37a6193a36ada
MD5 hash:
d5551243fc77866b384583c11dd67061
SHA1 hash:
60a9edffbb3985a211b52ce4933c3382ade944fb
SH256 hash:
b4f4f4919c51032d7db5444fe34f86d54d52c26c77a1fa6b8c25ca2ec5188903
MD5 hash:
b9d795db008895eccb8e3769fa21e4fc
SHA1 hash:
5783f4ccb2113d1022cb1e3ec33e49c72af388a3
SH256 hash:
0272bc08a5a908e90b6f4e7fe909bd5b31c361a2353ae29e4f7f242257039c05
MD5 hash:
968132743369e116e35d357ef59b1e34
SHA1 hash:
103050dee67b22c28a97d4cd1086138f664544f6
SH256 hash:
17a4ab991677271344c3d73c01d31e490a7a93b57c66c10fb21d50bc231c6e26
MD5 hash:
8f646a6283796079adb8709112c36d39
SHA1 hash:
e9c2f6ef27bf84f0338f89c829cdde64d08d41bb
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
831fd846d70e76b987dda13d14d550935288eca3f5b799c30e78a7eb133f12d8
MD5 hash:
3109fe7df976e12dce07d9cc63a9a61e
SHA1 hash:
2f1fb67298e5b4c228f63f470ee7972b448dc0db
Detections:
win_socelars_auto
SH256 hash:
3fe1d6f4cffcb4d8efdb599a4ecf4ec6f324ac87510bb914f76fb1f16ed25df6
MD5 hash:
6bfa02c190d26174c54a5b06972181bb
SHA1 hash:
0d4a5916d3ea505ae2e68be9db3cd2f0f8486362
SH256 hash:
280158b1919e90c265c66ae15106bc4a5439fed7e5bee5649bc1cd02f2eb14a2
MD5 hash:
b82c67ec9a69d5529241845dc7620532
SHA1 hash:
dbd3d872d9a5d6b43439751aacc57bce100c719a
SH256 hash:
8ab7234c935e62f994eff43c0eb595b57c03bb63ad9a070f1ec000daaf532f47
MD5 hash:
ea3083ce0517e72c2ae3a58c207c6e77
SHA1 hash:
6d247fa917280da4b7305d45354c00ab3c56bbe7
SH256 hash:
19e98771fa63687f7b8e9359b9c50c8a127e61b82397407ae1d7a03d4b7da414
MD5 hash:
70210bd4707c051f84fb0c770b968865
SHA1 hash:
b12d546dd20a8fff1352517cf654153aad6e5528
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments