MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 24d4daedba9b8060bf0d09b4383849b69e8d1741c3ffaad8156ab8cfa56f8625. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TeamBot
Vendor detections: 15
| SHA256 hash: | 24d4daedba9b8060bf0d09b4383849b69e8d1741c3ffaad8156ab8cfa56f8625 |
|---|---|
| SHA3-384 hash: | a35397dd2cbb0f651a8db99784e96b0f9e532db657d49d37a491bee623de8054d8490a8e6654e5c6b5f399582c5b88de |
| SHA1 hash: | 69680a99121d56023816bd8cb7218d0a320b8745 |
| MD5 hash: | 8ac2aa386d2ab6edb792785243dbde6b |
| humanhash: | apart-virginia-asparagus-idaho |
| File name: | 24D4DAEDBA9B8060BF0D09B4383849B69E8D1741C3FFA.exe |
| Download: | download sample |
| Signature | TeamBot |
| File size: | 7'407'662 bytes |
| First seen: | 2022-05-20 18:03:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 196608:J7jguSTvT9QduE6y75YFUlTzsP14uOX9s5gSmSec:JR0v5QduS0otGm9c |
| Threatray | 1'739 similar samples on MalwareBazaar |
| TLSH | T16E7633B8B241C871E5AA503F51939379ABFCCE007E69DA0D9250E77AB25313D341FA72 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe TeamBot |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 91.211.251.186:41933 | https://threatfox.abuse.ch/ioc/616164/ |
| 65.21.192.182:47562 | https://threatfox.abuse.ch/ioc/616166/ |
| 194.36.177.138:81 | https://threatfox.abuse.ch/ioc/616167/ |
| 193.124.22.2:4633 | https://threatfox.abuse.ch/ioc/616168/ |
| 193.124.22.34:19489 | https://threatfox.abuse.ch/ioc/616169/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
318
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
24D4DAEDBA9B8060BF0D09B4383849B69E8D1741C3FFA.exe
Verdict:
No threats detected
Analysis date:
2022-05-20 18:29:31 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Vidar
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
Nymaim, RedLine, SmokeLoader, Socelars,
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Generic Downloader
Yara detected Nymaim
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2021-12-24 00:38:22 UTC
AV detection:
20 of 25 (80.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'729 additional samples on MalwareBazaar
Result
Malware family:
socelars
Score:
10/10
Tags:
family:onlylogger family:redline family:socelars botnet:media24pns botnet:userv1 aspackv2 evasion infostealer loader spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
65.108.69.168:13293
159.69.246.184:13127
65.108.69.168:13293
159.69.246.184:13127
Unpacked files
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
Detections:
win_vidar_auto
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
ebfbf072b43bf867ce6d28061eb03e497d9b3b2178fb6f487943dcfd6cde532d
MD5 hash:
d0bdd9f765a3bc338ccc23768ec05994
SHA1 hash:
fd75c806f8189349b200b90a03e69f23e9d4dccf
SH256 hash:
7c3a152b9e7a46ecfde36b7aac04e1d973fbb57f1812e6d2ae7bc8a1f49990a3
MD5 hash:
6b331ddca53dd1431419dde7ea8d79e3
SHA1 hash:
0b6983d8d4d32c9972b2904b28c7280d65464b41
SH256 hash:
6ef7f601f03e4c0903ac573efa3b9be8940592bb5dfa26a015da66481aa45440
MD5 hash:
230f329ef336ac3114ce627bb0ac6d71
SHA1 hash:
795ae73f602deb1691434a49edb14878685ea67e
SH256 hash:
24d4daedba9b8060bf0d09b4383849b69e8d1741c3ffaad8156ab8cfa56f8625
MD5 hash:
8ac2aa386d2ab6edb792785243dbde6b
SHA1 hash:
69680a99121d56023816bd8cb7218d0a320b8745
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.