MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 20ea338af45c4221e0ac33de59e84a3cf0d0eed2f609fbad4d3227f5131de0e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Backdoor.TeamViewer


Vendor detections: 11


Intelligence 11 IOCs YARA 47 File information Comments

SHA256 hash: 20ea338af45c4221e0ac33de59e84a3cf0d0eed2f609fbad4d3227f5131de0e2
SHA3-384 hash: cb3c109e87274ec8e1c1b333f7cf42655efa3d8324ed62c34936705ddf2e10eac992eda2fa8825a83ed92512e36285c0
SHA1 hash: 18ff7d8bb78f57860902dd56328e99ca15b18552
MD5 hash: 89013ee6cec2e5f7158f9290bc697038
humanhash: red-iowa-quebec-october
File name:SecuriteInfo.com.Trojan.MulDropNET.43.31191.1818
Download: download sample
Signature Backdoor.TeamViewer
File size:21'102'080 bytes
First seen:2023-10-24 09:31:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 393216:qRNiqmEIO0N5JrMft1A+BkpsgrkqKF/YEryW0/1+rNtzDWGjXKUgs3bqmJisJh:qRNiqRunM11A+ipn6Bry5/WNtzDrjb3h
Threatray 119 similar samples on MalwareBazaar
TLSH T1C527233DB82D486BE0F5E1B85CA32CE39435A38843A2F555C6FC91C56D215BC7CA2B87
TrID 72.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.3% (.EXE) Win64 Executable (generic) (10523/12/4)
4.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:Backdoor.TeamViewer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
347
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Moving a file to the Program Files subdirectory
Launching the process to interact with network services
Modifying a system file
Using the Windows Management Instrumentation requests
Launching a process
Creating a service
Launching cmd.exe command interpreter
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Creating a window
Running batch commands
Creating a process with a hidden window
Searching for synchronization primitives
Searching for the window
Sending an HTTP GET request
Creating a file in the Program Files subdirectories
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun for a service
Unauthorized injection to a system process
Adding an exclusion to Microsoft Defender
Gathering data
Result
Verdict:
MALICIOUS
Result
Threat name:
Glupteba, LummaC Stealer, RedLine, Smoke
Detection:
malicious
Classification:
troj.adwa.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Encrypted powershell cmdline option found
Found malware configuration
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the hosts file
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1331164 Sample: SecuriteInfo.com.Trojan.Mul... Startdate: 24/10/2023 Architecture: WINDOWS Score: 100 179 www.testupdate.info 2->179 181 host-host-file8.com 2->181 183 9 other IPs or domains 2->183 199 Snort IDS alert for network traffic 2->199 201 Multi AV Scanner detection for domain / URL 2->201 203 Found malware configuration 2->203 205 23 other signatures 2->205 12 SecuriteInfo.com.Trojan.MulDropNET.43.31191.1818.exe 8 2->12         started        16 powershell.exe 2->16         started        18 svchost.exe 2->18         started        21 3 other processes 2->21 signatures3 process4 dnsIp5 157 C:\Users\user\...\whateveraddition.exe, PE32+ 12->157 dropped 159 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 12->159 dropped 161 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 12->161 dropped 163 3 other malicious files 12->163 dropped 267 Uses cmd line tools excessively to alter registry or file data 12->267 269 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->269 23 toolspub2.exe 12->23         started        26 setup.exe 7 12->26         started        29 whateveraddition.exe 1 4 12->29         started        35 5 other processes 12->35 31 conhost.exe 16->31         started        185 127.0.0.1 unknown unknown 18->185 33 WerFault.exe 21->33         started        file6 signatures7 process8 file9 221 Multi AV Scanner detection for dropped file 23->221 223 Detected unpacking (changes PE section rights) 23->223 225 Contains functionality to inject code into remote processes 23->225 227 Injects a PE file into a foreign processes 23->227 37 toolspub2.exe 23->37         started        145 C:\Users\user\AppData\Local\...\Install.exe, PE32 26->145 dropped 40 Install.exe 26->40         started        147 C:\Users\user\AppData\...\whiterapidpro1.exe, PE32+ 29->147 dropped 229 Creates multiple autostart registry keys 29->229 43 whiterapidpro1.exe 29->43         started        45 cmd.exe 13 29->45         started        149 C:\Users\user\AppData\Local\Temp\set16.exe, PE32 35->149 dropped 151 C:\Users\user\AppData\Local\Temp\K.exe, PE32 35->151 dropped 153 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 35->153 dropped 155 C:\Windows\System32\drivers\etc\hosts, ASCII 35->155 dropped 231 Detected unpacking (overwrites its own PE header) 35->231 233 Found Tor onion address 35->233 235 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 35->235 237 2 other signatures 35->237 47 set16.exe 2 35->47         started        49 K.exe 14 4 35->49         started        52 powershell.exe 35->52         started        signatures10 process11 dnsIp12 207 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 37->207 209 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->209 211 Maps a DLL or memory area into another process 37->211 219 2 other signatures 37->219 54 explorer.exe 37->54 injected 137 C:\Users\user\AppData\Local\...\Install.exe, PE32 40->137 dropped 213 Multi AV Scanner detection for dropped file 40->213 59 Install.exe 40->59         started        139 C:\Users\user\AppData\...\whiterapidpro.exe, PE32+ 43->139 dropped 141 C:\Users\user\AppData\...\2motherproject.exe, PE32 43->141 dropped 215 Machine Learning detection for dropped file 43->215 217 Creates multiple autostart registry keys 43->217 61 whiterapidpro.exe 43->61         started        63 chrome.exe 45->63         started        65 conhost.exe 45->65         started        143 C:\Users\user\AppData\Local\...\is-58BJ3.tmp, PE32 47->143 dropped 67 is-58BJ3.tmp 47->67         started        177 iplogger.com 148.251.234.93, 443, 49738, 49741 HETZNER-ASDE Germany 49->177 69 WerFault.exe 49->69         started        71 conhost.exe 52->71         started        file13 signatures14 process15 dnsIp16 187 100acresclub.com 103.53.42.238, 443, 49838 PUBLIC-DOMAIN-REGISTRYUS India 54->187 189 colisumy.com 211.168.53.110, 49793, 49839, 80 LGDACOMLGDACOMCorporationKR Korea Republic of 54->189 191 host-host-file8.com 95.214.26.34, 49782, 49783, 49810 CMCSUS Germany 54->191 119 C:\Users\user\AppData\Roaming\gchhcbj, PE32 54->119 dropped 131 2 other malicious files 54->131 dropped 239 System process connects to network (likely due to code injection or exploit) 54->239 241 Benign windows process drops PE files 54->241 243 Suspicious powershell command line found 54->243 257 2 other signatures 54->257 73 powershell.exe 54->73         started        121 C:\Users\user\AppData\Local\...\wKGzsPJ.exe, PE32 59->121 dropped 123 C:\Windows\System32behaviorgraphroupPolicy\gpt.ini, ASCII 59->123 dropped 245 Antivirus detection for dropped file 59->245 247 Multi AV Scanner detection for dropped file 59->247 249 Modifies Windows Defender protection settings 59->249 259 2 other signatures 59->259 75 forfiles.exe 59->75         started        78 forfiles.exe 59->78         started        90 3 other processes 59->90 133 2 other malicious files 61->133 dropped 251 Machine Learning detection for dropped file 61->251 253 Creates multiple autostart registry keys 61->253 80 whiterapid.exe 61->80         started        193 192.168.2.4, 1074, 14433, 3306 unknown unknown 63->193 195 239.255.255.250 unknown Reserved 63->195 83 chrome.exe 63->83         started        125 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 67->125 dropped 127 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 67->127 dropped 129 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 67->129 dropped 135 5 other files (4 malicious) 67->135 dropped 255 Uses schtasks.exe or at.exe to add and modify task schedules 67->255 85 MyBurn.exe 67->85         started        88 net.exe 67->88         started        92 2 other processes 67->92 file17 signatures18 process19 dnsIp20 94 Conhost.exe 73->94         started        261 Modifies Windows Defender protection settings 75->261 263 Adds extensions / path to Windows Defender exclusion list 75->263 96 cmd.exe 75->96         started        99 conhost.exe 75->99         started        101 cmd.exe 78->101         started        103 conhost.exe 78->103         started        165 45.61.160.199, 49746, 49853, 80 ASN-QUADRANET-GLOBALUS United States 80->165 265 Injects a PE file into a foreign processes 80->265 167 accounts.google.com 142.250.31.84, 443, 49740 GOOGLEUS United States 83->167 169 142.251.167.139, 443, 49739 GOOGLEUS United States 83->169 175 3 other IPs or domains 83->175 117 C:\ProgramData\...\ContentDVSvc.exe, PE32 85->117 dropped 105 conhost.exe 88->105         started        107 net1.exe 88->107         started        111 3 other processes 90->111 171 109.236.81.104, 1074, 49869 WORLDSTREAMNL Netherlands 92->171 173 cciptwd.net 185.141.63.172, 49866, 80 BELCLOUDBG Bulgaria 92->173 109 conhost.exe 92->109         started        file21 signatures22 process23 signatures24 197 Uses cmd line tools excessively to alter registry or file data 101->197 113 reg.exe 101->113         started        115 reg.exe 101->115         started        process25
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Smokeloader
Status:
Malicious
First seen:
2023-10-24 09:32:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
18 of 22 (81.82%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat family:glupteba family:smokeloader family:xmrig botnet:up3 backdoor discovery dropper evasion infostealer loader miner persistence rat rootkit spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies system certificate store
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Suspicious use of SetThreadContext
Drops file in System32 directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Manipulates WinMon driver.
Manipulates WinMonFS driver.
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Drops file in Drivers directory
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Stops running service(s)
Modifies boot configuration data using bcdedit
XMRig Miner payload
DcRat
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://host-file-host6.com/
http://host-host-file8.com/
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:crime_ZZ_botnet_aicm
Author:imp0rtp3
Description:DDoS Golang Botnet sample for linux called 'aicm'
Reference:https://twitter.com/IntezerLabs/status/1401869234511175683
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:Glupteba
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_DisableWinDefender
Author:ditekSHen
Description:Detects executables containing artifcats associated with disabling Widnows Defender
Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a Github gist
Rule name:INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA
Author:ditekSHen
Description:Detects executables referencing many varying, potentially fake Windows User-Agents
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_DLInjector04
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:msil_rc4
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shortloader
Author:Nikos 'n0t' Totosis
Description:ShortLoader Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Surtr
Author:Katie Kleemola
Description:Rule for Surtr Stage One
Rule name:SurtrStrings
Author:Katie Kleemola
Description:Strings for Surtr
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UroburosVirtualBoxDriver
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Backdoor.TeamViewer

Executable exe 20ea338af45c4221e0ac33de59e84a3cf0d0eed2f609fbad4d3227f5131de0e2

(this sample)

  
Delivery method
Distributed via web download

Comments