MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3b15547e53d7254ec42974dc5a1d7b72cffd722a41114944b5606a845be7b76d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 12


Intelligence 12 IOCs 5 YARA 8 File information Comments

SHA256 hash: 3b15547e53d7254ec42974dc5a1d7b72cffd722a41114944b5606a845be7b76d
SHA3-384 hash: 4c5cc2bbbde11f7ad6ac8cca884e380ae7cea0f516248401d3fdbe522cc446005715194012ca02822db57ee0d463c598
SHA1 hash: 96291cf1ce155f393919965359de528b2d661186
MD5 hash: ad1ca7ff685a17765d86adb4105b7bd7
humanhash: venus-asparagus-earth-high
File name:ad1ca7ff685a17765d86adb4105b7bd7.exe
Download: download sample
Signature DiamondFox
File size:5'988'139 bytes
First seen:2021-08-20 11:35:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:x7CvLUBsgSqm9iwNZOmcJ9sTqEQxvTNDagiE6ixeZKjG/RrkIk8lfYhlB:xALUCghwNZvWDOTBKjgd/lf2H
Threatray 431 similar samples on MalwareBazaar
TLSH T1EF563301F5ECD8F8DAC2B1348EAC2BB689D9F20907BC19DB7791968D3F34951D54222E
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://45.140.147.35/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.140.147.35/ https://threatfox.abuse.ch/ioc/192382/
95.181.172.100:6795 https://threatfox.abuse.ch/ioc/192435/
94.103.83.88:60362 https://threatfox.abuse.ch/ioc/192436/
51.254.68.139:8067 https://threatfox.abuse.ch/ioc/192437/
65.21.141.215:8374 https://threatfox.abuse.ch/ioc/192438/

Intelligence


File Origin
# of uploads :
1
# of downloads :
137
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ad1ca7ff685a17765d86adb4105b7bd7.exe
Verdict:
No threats detected
Analysis date:
2021-08-20 11:37:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Launching a process
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Reading critical registry keys
Delayed reading of the file
Deleting a recently created file
Searching for analyzing tools
Creating a file
Creating a window
Sending an HTTP GET request
Creating a process with a hidden window
Unauthorized injection to a recently created process
Stealing user critical data
Query of malicious DNS domain
Connection attempt to an infection source
Sending a TCP request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot RedLine Vidar
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Cryptbot
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 468808 Sample: n7FebMFA3S.exe Startdate: 20/08/2021 Architecture: WINDOWS Score: 100 74 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->74 96 Multi AV Scanner detection for domain / URL 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 Antivirus detection for URL or domain 2->100 102 13 other signatures 2->102 11 n7FebMFA3S.exe 16 2->11         started        signatures3 process4 file5 52 C:\Users\user\AppData\...\setup_install.exe, PE32 11->52 dropped 54 C:\Users\user\...\Sun23f281f9641a0538.exe, PE32 11->54 dropped 56 C:\Users\user\...\Sun23e42c6c4f807.exe, PE32+ 11->56 dropped 58 11 other files (6 malicious) 11->58 dropped 14 setup_install.exe 1 11->14         started        process6 dnsIp7 90 127.0.0.1 unknown unknown 14->90 92 192.168.2.1 unknown unknown 14->92 132 Adds a directory exclusion to Windows Defender 14->132 18 cmd.exe 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 7 other processes 14->24 signatures8 process9 signatures10 27 Sun236aabe3fc741.exe 18->27         started        32 Sun23f281f9641a0538.exe 20->32         started        34 Sun23ccd14b1f.exe 22->34         started        104 Adds a directory exclusion to Windows Defender 24->104 36 Sun23e42c6c4f807.exe 1 14 24->36         started        38 Sun232280136fb70b5f.exe 24->38         started        40 Sun23678302d9cc50b1.exe 24->40         started        42 3 other processes 24->42 process11 dnsIp12 76 185.233.185.134 YURTEH-ASUA Russian Federation 27->76 78 37.0.10.214 WKD-ASIE Netherlands 27->78 84 14 other IPs or domains 27->84 60 C:\Users\...\sJEFza15jXMH15g12IfmRCPe.exe, PE32+ 27->60 dropped 62 C:\Users\...\ph_U1g_8JPE5fFdzzcbcN3gn.exe, PE32 27->62 dropped 64 C:\Users\...\lfvbCPWLfeERDi_mCwK4El_B.exe, PE32 27->64 dropped 70 41 other files (37 malicious) 27->70 dropped 106 Drops PE files to the document folder of the user 27->106 108 Disable Windows Defender real time protection (registry) 27->108 80 185.230.143.16 HostingvpsvilleruRU Russian Federation 32->80 110 Query firmware table information (likely to detect VMs) 32->110 112 Tries to detect sandboxes and other dynamic analysis tools (window names) 32->112 130 2 other signatures 32->130 114 Machine Learning detection for dropped file 34->114 116 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 34->116 118 Checks if the current machine is a virtual machine (disk enumeration) 34->118 44 explorer.exe 34->44 injected 86 4 other IPs or domains 36->86 66 C:\Users\user\AppData\...\fastsystem.exe, PE32+ 36->66 dropped 68 C:\Users\user\AppData\...\aaa_011[1].dll, DOS 36->68 dropped 120 Contains functionality to steal Chrome passwords or cookies 36->120 122 Drops PE files to the startup folder 36->122 82 88.99.66.31 HETZNER-ASDE Germany 38->82 124 Detected unpacking (changes PE section rights) 38->124 126 Tries to harvest and steal browser information (history, passwords, etc) 40->126 88 2 other IPs or domains 42->88 128 Creates processes via WMI 42->128 46 Sun235f9cc50c9.exe 42->46         started        file13 signatures14 process15 dnsIp16 94 104.21.70.98 CLOUDFLARENETUS United States 46->94 72 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 46->72 dropped 50 conhost.exe 46->50         started        file17 process18
Threat name:
Win32.Trojan.Mokes
Status:
Malicious
First seen:
2021-08-16 12:08:24 UTC
AV detection:
33 of 46 (71.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:redline family:smokeloader family:vidar botnet:706 botnet:second_7.5k aspackv2 backdoor discovery evasion infostealer spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
CryptBot
CryptBot Payload
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
lysuht78.top
morisc07.top
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
https://lenak513.tumblr.com/
45.14.49.200:27625
Unpacked files
SH256 hash:
2d6e2e392d2f113ba36f21860d1acfbbd764f171896b011fe235325aa0ebdab0
MD5 hash:
ea68e0ccbd0dec2b638d1c299d4f99f3
SHA1 hash:
4f89cb8e5f65793fc07e1a0f751140ac86cb2f4c
SH256 hash:
a19adea0a2b66cfcb23eebd1d1ff9d854eccd4dc65536a45665c149da4ff6265
MD5 hash:
117c7ff5dd9efc0b059f64520f2d4f46
SHA1 hash:
ff07b1fcc58aa62b42d797981e0d953d9f9e0120
SH256 hash:
dcb842f5e0da9d486cad34d4b809dcaadf9ec4d6991fdb22bdc9aea66489ad1a
MD5 hash:
c02a029c978f13b753c6b578b1588c75
SHA1 hash:
e125d59451e7f467bfd329a00a506decbcd91d83
SH256 hash:
aef57f9041d2a72d7f91267da4fb59c5549b64ea5c8d835700017c76a9f5cd5b
MD5 hash:
9316c127482b3b9a18d13a0822f04dc1
SHA1 hash:
9efdd3abbb3cc93367a5d05aa43bc55cf2a8d1a3
SH256 hash:
c83c6bbdf2a042df0c8343aed3d04a09e2f09b7c97ca13da4e141b2ee6b73e24
MD5 hash:
bd04c2aaa95597b44e601173a12ff67a
SHA1 hash:
6482176bc16a64fe9df5f4615c30dfddc083dcfc
SH256 hash:
a50330931d6fe0c345193468dffb7f3b67d83baaba22f2faec18bc778434c951
MD5 hash:
28a739d81655c4a5732d99c5119063d1
SHA1 hash:
5e6b42ab8583d63d89e30f87c2406d34b46547bf
SH256 hash:
558e587a3f0eae11fb9fb06d11e5836517d3cf197d71e8f5e8c1157f46330f41
MD5 hash:
101f2ca187a77736844fab6ad0c2fad0
SHA1 hash:
51c054b11b82caec19e2da0213c9d0c3eefbdf1b
SH256 hash:
b3e828afd5ca30eb3eeb3aff5727ab295601df787ca5c497f5ad4afe4587d3e9
MD5 hash:
5badcb4fe401eaf7a63eed6a83f06a44
SHA1 hash:
bbf893754b45da12bb2bd85ca63cd5c2ca69db92
SH256 hash:
758fce26a00ca554eaafb38751618b836fa1f3b9917103c9a666e7823974c929
MD5 hash:
97f3a0063614c81b3ebcc2758c3f3974
SHA1 hash:
fd0a53ca2b4adcfc3f731f97f225cdce7ada7eb9
SH256 hash:
01368e0ae15cc2569cb19a4885e6eef3104e1dba7d0db835c1c6d4f19d0a4b6e
MD5 hash:
18cb6a39fec8fe2289791639edc569a5
SHA1 hash:
31e54a92fde9ac91896c6e872d7f65d78a5c72ff
SH256 hash:
3b15547e53d7254ec42974dc5a1d7b72cffd722a41114944b5606a845be7b76d
MD5 hash:
ad1ca7ff685a17765d86adb4105b7bd7
SHA1 hash:
96291cf1ce155f393919965359de528b2d661186
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:MALWARE_Win_MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:win_cryptbot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.cryptbot.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments