MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2df4e3a4d7b6e5f33ef54c73ff86ffc76d8667ff587756a2887bf91687ab46a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 9 File information Comments

SHA256 hash: 2df4e3a4d7b6e5f33ef54c73ff86ffc76d8667ff587756a2887bf91687ab46a9
SHA3-384 hash: e8be993fbae2f856aca0787666e932e08b171fad56f23d3ff3e8a8b8b98f5118992f85700c3c5ec2f71f2c9279f560e3
SHA1 hash: 8bfd0a7d5d8196df13360e221595c91d3b00135a
MD5 hash: 7c323309d9ba89c75f3cdc13e1a9513e
humanhash: utah-quebec-oscar-three
File name:7C323309D9BA89C75F3CDC13E1A9513E.exe
Download: download sample
Signature Adware.FileTour
File size:3'235'718 bytes
First seen:2021-07-03 21:55:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ae9f6a32bb8b03dce37903edbc855ba1 (28 x CryptOne, 18 x RedLineStealer, 15 x njrat)
ssdeep 98304:vKI+y15KbEN1RK6EBFjabPdnfoNPNocv/AZoAPZ1V:v5sryPdwdNo/eAPZ1V
TLSH 2AE5235667C604B1C2A23D304FA9DB324B78BC321B2551E763D52F1F7E3C5D2A226B62
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
185.183.96.53:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.183.96.53:80 https://threatfox.abuse.ch/ioc/157401/

Intelligence


File Origin
# of uploads :
1
# of downloads :
218
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Xforce_keygen_by_KeygenSumo.zip
Verdict:
Malicious activity
Analysis date:
2021-07-02 04:18:49 UTC
Tags:
evasion trojan rat azorult stealer loader miner raccoon fareit pony keylogger agenttesla redline phishing vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates files with lurking names (e.g. Crack.exe)
Detected VMProtect packer
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample is protected by VMProtect
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 443880 Sample: 0ak0YL2Y5p.exe Startdate: 03/07/2021 Architecture: WINDOWS Score: 100 71 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->71 73 Multi AV Scanner detection for domain / URL 2->73 75 Antivirus detection for dropped file 2->75 77 8 other signatures 2->77 9 0ak0YL2Y5p.exe 14 2->9         started        process3 file4 47 C:\Users\user\AppData\Local\...\note866.exe, PE32 9->47 dropped 49 C:\Users\user\AppData\Local\...\hbggg.exe, PE32 9->49 dropped 51 C:\Users\user\AppData\Local\...\IDWCH1.exe, PE32 9->51 dropped 53 2 other malicious files 9->53 dropped 99 Creates files with lurking names (e.g. Crack.exe) 9->99 13 Crack.exe 6 9->13         started        17 note866.exe 13 9->17         started        signatures5 process6 dnsIp7 55 C:\Users\user\AppData\Local\...\install.dll, PE32 13->55 dropped 57 C:\Users\user\AppData\...\adobe_caps.dll, PE32 13->57 dropped 101 Antivirus detection for dropped file 13->101 103 Multi AV Scanner detection for dropped file 13->103 105 Machine Learning detection for dropped file 13->105 20 rundll32.exe 3 13->20         started        23 conhost.exe 13->23         started        61 101.36.107.74, 49715, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 17->61 63 iplogger.org 88.99.66.31, 443, 49717 HETZNER-ASDE Germany 17->63 59 C:\Users\user\Documents\...\note866.exe, PE32 17->59 dropped 107 Drops PE files to the document folder of the user 17->107 109 May check the online IP address of the machine 17->109 111 Tries to harvest and steal browser information (history, passwords, etc) 17->111 file8 signatures9 process10 signatures11 79 Contains functionality to infect the boot sector 20->79 81 Contains functionality to inject threads in other processes 20->81 83 Contains functionality to inject code into remote processes 20->83 85 5 other signatures 20->85 25 svchost.exe 1 20->25 injected 28 svchost.exe 20->28 injected 30 svchost.exe 20->30 injected 32 13 other processes 20->32 process12 signatures13 91 System process connects to network (likely due to code injection or exploit) 25->91 93 Contains functionality to infect the boot sector 25->93 95 Contains functionality to inject threads in other processes 25->95 97 4 other signatures 25->97 34 svchost.exe 4 14 25->34         started        39 svchost.exe 2 25->39         started        41 UsoClient.exe 28->41         started        process14 dnsIp15 65 208.95.112.1 TUT-ASUS United States 34->65 67 172.67.200.215 CLOUDFLARENETUS United States 34->67 43 C:\Users\user\AppData\...\Login Data.tmp, SQLite 34->43 dropped 45 C:\Users\user\AppData\Local\...\Cookies.tmp, SQLite 34->45 dropped 87 Query firmware table information (likely to detect VMs) 34->87 89 Tries to harvest and steal browser information (history, passwords, etc) 34->89 69 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 39->69 file16 signatures17
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2021-07-01 10:38:05 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar discovery evasion infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Drops desktop.ini file(s)
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
VMProtect packed file
Checks for common network interception software
RedLine
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Unpacked files
SH256 hash:
f925042612da337f442d6c21b8ec0417dd5e935b10e36e1e1f13884eee02476b
MD5 hash:
c96ea2ff92b44976cb3a0bb7247338bb
SHA1 hash:
49365040448fbe19730d5eb2f7b2687e1da637c2
SH256 hash:
01808f7bce25db18bce99e432555fcfff148a1d931128edebc816975145cabd7
MD5 hash:
5e6df381ce1c9102799350b7033e41df
SHA1 hash:
f8a4012c9547d9bb2faecfba75fc69407aaec288
SH256 hash:
b26d99296cc1f38ad735c36a305eb206b8a9022e92b463886ed918f42dee0b04
MD5 hash:
9decb9ebf19e4e45bd75f175140e1018
SHA1 hash:
c9d35d2bc78dd37270dbe17f2555324c6f560d11
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
ef4cb5a185d79b25f354d05b83a4337bb84da1c9bf6fa1306556e465770c8ef6
MD5 hash:
715b6cbd01973cc8b29738e438c5361c
SHA1 hash:
b2717405dc291f531d4ab477489f13e615293c77
SH256 hash:
fe9a16177921e50e6932d8f7a7f82912103db922b70f93cb020a456dad70cffc
MD5 hash:
969b1500ebe33a6c368c9ea5a3c81884
SHA1 hash:
04c5279c957a93f2653a0ce5bc9707c6144ab165
SH256 hash:
38328a0fc304d511910613d6b4e489100a67d9ad0ecb44d05e9e726364f14bf7
MD5 hash:
0326674c127f8f12f173bfbe4bb6b0f1
SHA1 hash:
161e5d8cb4d1cb19b4e2e32719dd978fabaf05f7
SH256 hash:
2f4191597694f2bdf833069d541e533879c9e6b00fa596ed930f0cfd3d34706f
MD5 hash:
132bcce5f42237d29606d967a5af945c
SHA1 hash:
dc7cc98c9497dcf1e6e2bcddbf0b1dc8156fa87c
SH256 hash:
2df4e3a4d7b6e5f33ef54c73ff86ffc76d8667ff587756a2887bf91687ab46a9
MD5 hash:
7c323309d9ba89c75f3cdc13e1a9513e
SHA1 hash:
8bfd0a7d5d8196df13360e221595c91d3b00135a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments