MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24e73e485857368cf7ec4e1b44b5d9cf86a16fbb8eafd89626b47703256db22d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 6 File information Comments

SHA256 hash: 24e73e485857368cf7ec4e1b44b5d9cf86a16fbb8eafd89626b47703256db22d
SHA3-384 hash: 3c1cba12f1e0b9d5829d226bbf986e2be7760a078335b3ca50935a271488e2d36cc4264b8116296f6c1aad5a0d24e22a
SHA1 hash: 426852554437ddca858ca5cb79e390b1d72d7c2e
MD5 hash: 97fcd0031aaf62bcc325ac538ba25de3
humanhash: ack-oven-nineteen-delaware
File name:97fcd0031aaf62bcc325ac538ba25de3
Download: download sample
Signature Adware.FileTour
File size:1'271'584 bytes
First seen:2021-06-12 06:59:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 24576:pAT8QE+kQ/2i+llsSpheMV81v26ABE5snZihtEmrk6sG5op5oKLB:pAI+HYl5lC1+6AE5snZCrJB25pLB
TLSH 07452339A680853AC1210D714C5BD3B6B93BBA045FBC54CFB2D94D6C8D2778A1B7239B
Reporter zbetcheckin
Tags:32 Adware.FileTour exe

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://34.76.8.115/ https://threatfox.abuse.ch/ioc/98907/

Intelligence


File Origin
# of uploads :
1
# of downloads :
450
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the Program Files subdirectories
Deleting a recently created file
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Replacing files
Sending a UDP request
Creating a file in the Windows subdirectories
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Running batch commands
Creating a file in the %AppData% directory
Creating a file
Searching for the window
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Connection attempt
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file access)
Yara detected AntiVM3
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 433533 Sample: FK1RtVDPVt Startdate: 12/06/2021 Architecture: WINDOWS Score: 100 177 Multi AV Scanner detection for domain / URL 2->177 179 Found malware configuration 2->179 181 Antivirus detection for URL or domain 2->181 183 15 other signatures 2->183 12 FK1RtVDPVt.exe 18 13 2->12         started        15 iexplore.exe 2 66 2->15         started        18 WinHoster.exe 2->18         started        20 WinHoster.exe 2->20         started        process3 dnsIp4 141 C:\Program Files (x86)\...\Toner-Recover.exe, PE32 12->141 dropped 143 C:\Program Files (x86)\VR\...\Second.exe, PE32 12->143 dropped 145 C:\Program Files (x86)\VR\...\RunWW.exe, PE32 12->145 dropped 147 C:\Program Files (x86)\VR\...\Uninstall.exe, PE32 12->147 dropped 22 Second.exe 2 12->22         started        25 RunWW.exe 86 12->25         started        29 Toner-Recover.exe 12->29         started        175 192.168.2.1 unknown unknown 15->175 31 iexplore.exe 39 15->31         started        33 iexplore.exe 15->33         started        file5 process6 dnsIp7 113 C:\Users\user\AppData\Local\...\Second.tmp, PE32 22->113 dropped 35 Second.tmp 3 14 22->35         started        161 159.69.20.131, 49743, 49765, 80 HETZNER-ASDE Germany 25->161 163 bandakere.tumblr.com 74.114.154.22, 443, 49741, 49764 AUTOMATTICUS Canada 25->163 115 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 25->115 dropped 117 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 25->117 dropped 119 C:\Users\user\AppData\...\mozglue[1].dll, PE32 25->119 dropped 121 3 other files (none is malicious) 25->121 dropped 207 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 25->207 209 Tries to steal Crypto Currency Wallets 25->209 40 cmd.exe 25->40         started        165 iplogger.org 88.99.66.31, 443, 49720, 49721 HETZNER-ASDE Germany 31->165 file8 signatures9 process10 dnsIp11 155 download-serv-124473.xyz 172.67.163.69, 49716, 49717, 80 CLOUDFLARENETUS United States 35->155 157 googlehosted.l.googleusercontent.com 142.250.180.225, 443, 49722, 49724 GOOGLEUS United States 35->157 159 3 other IPs or domains 35->159 105 C:\Users\user\AppData\Local\...\Setup.exe, PE32 35->105 dropped 107 C:\Users\user\AppData\...\itdownload.dll, PE32 35->107 dropped 109 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 35->109 dropped 111 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 35->111 dropped 197 Performs DNS queries to domains with low reputation 35->197 42 Setup.exe 15 9 35->42         started        47 conhost.exe 40->47         started        49 taskkill.exe 40->49         started        51 timeout.exe 40->51         started        file12 signatures13 process14 dnsIp15 167 topnewsdesign.xyz 104.21.69.75, 443, 49742 CLOUDFLARENETUS United States 42->167 169 iplogger.org 42->169 133 C:\Users\user\AppData\Roaming\7183688.exe, PE32 42->133 dropped 135 C:\Users\user\AppData\Roaming\5998294.exe, PE32 42->135 dropped 137 C:\Users\user\AppData\Roaming\4043895.exe, PE32 42->137 dropped 139 2 other malicious files 42->139 dropped 211 Detected unpacking (changes PE section rights) 42->211 213 Detected unpacking (overwrites its own PE header) 42->213 215 Performs DNS queries to domains with low reputation 42->215 53 4043895.exe 42->53         started        56 3284469.exe 42->56         started        59 3956321.exe 42->59         started        61 2 other processes 42->61 file16 signatures17 process18 dnsIp19 199 Injects a PE file into a foreign processes 53->199 64 4043895.exe 53->64         started        123 C:\Users\user\AppData\...\WinHoster.exe, PE32 56->123 dropped 201 Detected unpacking (changes PE section rights) 56->201 203 Detected unpacking (overwrites its own PE header) 56->203 69 WinHoster.exe 56->69         started        71 3956321.exe 59->71         started        171 nyslaldond.xyz 185.125.18.29, 80 QS-ASRU Russian Federation 61->171 173 iphonemoney.xyz 104.21.51.159, 443, 49747 CLOUDFLARENETUS United States 61->173 125 C:\ProgramData\58\vcruntime140.dll, PE32 61->125 dropped 127 C:\ProgramData\58\sqlite3.dll, PE32 61->127 dropped 129 C:\ProgramData\58\softokn3.dll, PE32 61->129 dropped 131 4 other files (none is malicious) 61->131 dropped 205 Performs DNS queries to domains with low reputation 61->205 73 WerFault.exe 61->73         started        file20 signatures21 process22 dnsIp23 149 tttttt.me 95.216.186.40, 443, 49761 HETZNER-ASDE Germany 64->149 151 34.76.8.115, 49762, 80 GOOGLEUS United States 64->151 89 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 64->89 dropped 91 C:\Users\user\AppData\...\vcruntime140.dll, PE32 64->91 dropped 93 C:\Users\user\AppData\...\ucrtbase.dll, PE32 64->93 dropped 101 56 other files (none is malicious) 64->101 dropped 185 Tries to steal Mail credentials (via file access) 64->185 75 cmd.exe 64->75         started        187 Detected unpacking (changes PE section rights) 69->187 189 Detected unpacking (overwrites its own PE header) 69->189 153 bandakere.tumblr.com 71->153 95 C:\ProgramData\vcruntime140.dll, PE32 71->95 dropped 97 C:\ProgramData\softokn3.dll, PE32 71->97 dropped 99 C:\ProgramData\nss3.dll, PE32 71->99 dropped 103 3 other files (none is malicious) 71->103 dropped 191 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 71->191 193 Tries to harvest and steal browser information (history, passwords, etc) 71->193 195 Tries to steal Crypto Currency Wallets 71->195 77 cmd.exe 71->77         started        file24 signatures25 process26 process27 79 conhost.exe 75->79         started        81 timeout.exe 75->81         started        83 conhost.exe 77->83         started        85 taskkill.exe 77->85         started        87 timeout.exe 77->87         started       
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-12 06:45:22 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:vidar botnet:a209f001fa31695840427e137517f126fcaa82e9 discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
NTFS ADS
Runs .reg file with regedit
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Raccoon
RedLine
RedLine Payload
Vidar
Unpacked files
SH256 hash:
ec32b38e5ad5c285c1d6d8237341a99772709e8e4ea23db953d63ab8f078379c
MD5 hash:
ccf4a60623b784b084855d0468d76eab
SHA1 hash:
9419cc65a1bb70e8780f6da7cedd169eb333db88
SH256 hash:
36c0ac6b4306f85e8a489a6a83e40af98fd2aa9b9d3127f4b3f4577ac8c6586b
MD5 hash:
1eda159c618b333b6733780e47d0ee95
SHA1 hash:
9545d563a3705445429c38d83c38354e02886264
SH256 hash:
24e73e485857368cf7ec4e1b44b5d9cf86a16fbb8eafd89626b47703256db22d
MD5 hash:
97fcd0031aaf62bcc325ac538ba25de3
SHA1 hash:
426852554437ddca858ca5cb79e390b1d72d7c2e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Adware.FileTour

Executable exe 24e73e485857368cf7ec4e1b44b5d9cf86a16fbb8eafd89626b47703256db22d

(this sample)

  
Delivery method
Distributed via web download

Comments