MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 497d6c2077bc72c42f5623e82c1da083b4541b69b428021dc8bb65661166ec1e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 19 File information Comments

SHA256 hash: 497d6c2077bc72c42f5623e82c1da083b4541b69b428021dc8bb65661166ec1e
SHA3-384 hash: 4c272c116d04433d55e04acaa0757908f77ed90f2020a112749f6c0ef51f77a59d10a08240c51caf7894ea26c231f6dc
SHA1 hash: 7a7671111c5a29fdabf73fd916851cd3c21be82b
MD5 hash: 0de6d453bb0eeed2910795a70279d479
humanhash: angel-nuts-bakerloo-william
File name:0DE6D453BB0EEED2910795A70279D479.exe
Download: download sample
Signature DiamondFox
File size:3'749'846 bytes
First seen:2021-07-05 03:20:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xnXxj+HYwT2Vbo0/tF31rRNojLQMCvLUBsKgFX:xnXxj+HY9N/v31rRUQRLUCKQX
TLSH 7F06331432D1C0F3D6D42134EC44FBF25AF9D3AC4A624ADB7B64D86D5B38E60922762E
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://xeihqe72.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://xeihqe72.top/index.php https://threatfox.abuse.ch/ioc/157485/

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0DE6D453BB0EEED2910795A70279D479.exe
Verdict:
No threats detected
Analysis date:
2021-07-05 03:21:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Vidar Backstage Stealer Glupteba RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected Info Stealer Vidar
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops executable to a common third party application directory
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Backstage Stealer
Yara detected BatToExe compiled binary
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 444078 Sample: eOKc6P237n.exe Startdate: 05/07/2021 Architecture: WINDOWS Score: 100 183 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->183 185 Multi AV Scanner detection for domain / URL 2->185 187 Found malware configuration 2->187 189 18 other signatures 2->189 11 eOKc6P237n.exe 17 2->11         started        process3 file4 95 C:\Users\user\AppData\...\setup_install.exe, PE32 11->95 dropped 97 C:\Users\user\AppData\Local\...\sotema_9.txt, PE32 11->97 dropped 99 C:\Users\user\AppData\Local\...\sotema_8.txt, PE32 11->99 dropped 101 12 other files (none is malicious) 11->101 dropped 14 setup_install.exe 1 11->14         started        process5 dnsIp6 163 razino.xyz 172.67.213.185, 49687, 80 CLOUDFLARENETUS United States 14->163 165 127.0.0.1 unknown unknown 14->165 167 192.168.2.1 unknown unknown 14->167 245 Detected unpacking (changes PE section rights) 14->245 247 Performs DNS queries to domains with low reputation 14->247 18 cmd.exe 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 7 other processes 14->24 signatures7 process8 process9 26 sotema_7.exe 18->26         started        31 sotema_1.exe 5 20->31         started        33 sotema_3.exe 87 22->33         started        35 sotema_5.exe 2 24->35         started        37 sotema_2.exe 1 24->37         started        39 sotema_4.exe 1 1 24->39         started        41 3 other processes 24->41 dnsIp10 149 flamkravmaga.com 26->149 151 privacytoolsforyoufree.xyz 45.133.245.228, 49698, 80 IHOR-CORE-ASRU Russian Federation 26->151 155 9 other IPs or domains 26->155 103 C:\Users\...\youfKAxBmYuovTGwQvYrL6qY.exe, PE32 26->103 dropped 105 C:\Users\...\wguQ1gSi344baimsu_g2X_Cs.exe, PE32 26->105 dropped 115 28 other files (20 malicious) 26->115 dropped 193 Drops PE files to the document folder of the user 26->193 195 May check the online IP address of the machine 26->195 197 Performs DNS queries to domains with low reputation 26->197 199 Disable Windows Defender real time protection (registry) 26->199 43 5zmTpFkMdSqAsYZaDwh3oKqR.exe 26->43         started        47 e1d0TLlsO1nLzKY7kyvDs55d.exe 26->47         started        49 K0sSXocJNret4zJeuzot_Cf4.exe 26->49         started        60 8 other processes 26->60 107 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 31->107 dropped 51 rundll32.exe 31->51         started        157 2 other IPs or domains 33->157 117 7 other files (1 malicious) 33->117 dropped 201 Detected unpacking (changes PE section rights) 33->201 203 Detected Info Stealer Vidar 33->203 205 Detected unpacking (overwrites its own PE header) 33->205 207 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->207 109 C:\Users\user\AppData\Local\...\sotema_5.tmp, PE32 35->109 dropped 53 sotema_5.tmp 35->53         started        111 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 37->111 dropped 209 DLL reload attack detected 37->209 211 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->211 213 Renames NTDLL to bypass HIPS 37->213 215 Checks if the current machine is a virtual machine (disk enumeration) 37->215 56 explorer.exe 37->56 injected 159 4 other IPs or domains 39->159 113 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 39->113 dropped 62 3 other processes 39->62 153 176.111.174.254 WILWAWPL Russian Federation 41->153 161 3 other IPs or domains 41->161 119 3 other files (none is malicious) 41->119 dropped 217 2 other signatures 41->217 58 sotema_9.exe 41->58         started        file11 signatures12 process13 dnsIp14 121 C:\ProgramData\...\information.txt, ISO-8859 43->121 dropped 133 6 other files (none is malicious) 43->133 dropped 219 Detected unpacking (changes PE section rights) 43->219 221 Detected Info Stealer Vidar 43->221 223 Detected unpacking (overwrites its own PE header) 43->223 241 3 other signatures 43->241 225 DLL reload attack detected 47->225 64 e1d0TLlsO1nLzKY7kyvDs55d.exe 47->64         started        227 Query firmware table information (likely to detect VMs) 49->227 229 Tries to detect sandboxes and other dynamic analysis tools (window names) 49->229 231 Hides threads from debuggers 49->231 233 Writes to foreign memory regions 51->233 235 Allocates memory in foreign processes 51->235 237 Creates a thread in another existing process (thread injection) 51->237 68 svchost.exe 51->68 injected 70 svchost.exe 51->70 injected 141 requested404.com 63.250.33.126, 49692, 80 NAMECHEAP-NETUS United States 53->141 123 C:\Users\user\...\JFHGSFGSIUGFSUIG.exe, PE32 53->123 dropped 125 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 53->125 dropped 135 2 other files (none is malicious) 53->135 dropped 72 JFHGSFGSIUGFSUIG.exe 53->72         started        143 159.65.63.164 DIGITALOCEAN-ASNUS United States 60->143 127 C:\Program Files (x86)\...\md8_8eus.exe, PE32 60->127 dropped 129 C:\Program Files (x86)\Company\...\jooyu.exe, PE32 60->129 dropped 131 C:\Program Files (x86)\...\jingzhang.exe, PE32 60->131 dropped 137 2 other files (1 malicious) 60->137 dropped 239 Sample uses process hollowing technique 60->239 243 2 other signatures 60->243 75 conhost.exe 60->75         started        77 conhost.exe 60->77         started        79 conhost.exe 60->79         started        file15 signatures16 process17 dnsIp18 85 C:\Users\user\AppData\Local\Temp\AE30.tmp, PE32 64->85 dropped 169 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 64->169 171 Renames NTDLL to bypass HIPS 64->171 173 Checks if the current machine is a virtual machine (disk enumeration) 64->173 175 System process connects to network (likely due to code injection or exploit) 68->175 177 Sets debug register (to hijack the execution of another thread) 68->177 179 Modifies the context of a thread in another process (thread injection) 68->179 81 svchost.exe 68->81         started        145 173.222.108.226 AKAMAI-ASN1EU United States 72->145 147 162.0.210.44 ACPCA Canada 72->147 87 C:\Program Files (x86)\...\Peshysusege.exe, PE32 72->87 dropped 89 C:\...\Peshysusege.exe.config, XML 72->89 dropped 91 C:\Users\user\AppData\...91ozhirysofi.exe, PE32 72->91 dropped 93 2 other files (none is malicious) 72->93 dropped 181 Drops executable to a common third party application directory 72->181 file19 signatures20 process21 dnsIp22 139 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 81->139 191 Query firmware table information (likely to detect VMs) 81->191 signatures23
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-07-02 17:13:23 UTC
AV detection:
27 of 46 (58.70%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:cana botnet:domani2 aspackv2 backdoor infostealer persistence stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
detuyaluro.xyz:80
176.111.174.254:56328
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
8facc248b228ad5d0a5819a7a5761d668f452d46359bad5953845fc547c89576
MD5 hash:
3c313b03eaff7a3af833cb08562ad457
SHA1 hash:
d47da4f0ce7a3d17a17e877ff160c9e4fbe39599
SH256 hash:
aa6cc42ad1c627460a4c54cfa46fa1934518c510d2bdb323ee119c460136ed3f
MD5 hash:
f2eb93b3bbe3cad8a4b76e74ffd3ccff
SHA1 hash:
e018afa2e24e5eb03598d37d9142674ad1d7ac2f
SH256 hash:
7296d60423fbfc4877e7bbb0c1352d0756908f9fbc53679bce463320e3a382f0
MD5 hash:
7ca1af0d05d832e6039ddb2629c6007f
SHA1 hash:
b3cf5b027fa6ee5a6cebb33bde0b36eb17e9956c
SH256 hash:
8c7cdb6916702d2387737927da9a3c49a6f4c1033545c1ed9bb37fc2829e4803
MD5 hash:
dca556c5c11a934a767c12ac44f179e5
SHA1 hash:
900f5ad3481cdb4f82dccf97d0b7ab272e599dce
SH256 hash:
86300bc3840823f13e7563310475985964be4dcc7bd6e2fb25d41912a4f9c5a1
MD5 hash:
906504ca2ae62335c416650c046c9edc
SHA1 hash:
e5dbd82e9bd7bcade71a46c63f0ef165fe6310de
SH256 hash:
bced882ec4bfad03e504f2455b6126646c986921e383d83ee1344ad6283070db
MD5 hash:
190a5ae0049f90027a9596f5c5d3e28a
SHA1 hash:
962a26294f8af5617b801ea3066a3af3ad3acf71
SH256 hash:
6fa5486a12911d9dae24fb7761c9768a3b4c9ec9e6bca340cb0a334d01c249d8
MD5 hash:
5e3db7fe29ca11d43d5a4ec72902b802
SHA1 hash:
771f697b199537deb121d75bdbf5531486529e13
SH256 hash:
55523a6e7dc7c0b35d04be805230668e24b3e8c293551a75d03d731201e41073
MD5 hash:
114d552ceca43cba9fcca04b7efc82b7
SHA1 hash:
7aa64f4f2535e0b20ff4ed8d60d1dea0f99b4473
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
b176236b8b45c7d80560b784945d43fa7710ad197db64843673d0df33caaa69b
MD5 hash:
b189061476b1ba11e31db9e3bbfe98e2
SHA1 hash:
c429646ce666aabb42b372e80898c4874b7c3090
SH256 hash:
803b50725bf88f35f41ead18c55dbb57d30ada81e3ce63757505fce5efb60140
MD5 hash:
5b41f469c10147f4203de9ccf153ffab
SHA1 hash:
bd2829615c350b5856b73242232df0e43c1b93bf
SH256 hash:
c7dcc52d680abbfa5fa776d2b9ffa1a8360247617d6bef553a29da8356590f0b
MD5 hash:
a73c42ca8cdc50ffefdd313e2ba4d423
SHA1 hash:
7fcc3b60e169fe3c64935de7e431654f570d9dd2
SH256 hash:
d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
MD5 hash:
7b61795697b50fb19d1f20bd8a234b67
SHA1 hash:
5134692d456da79579e9183c50db135485e95201
SH256 hash:
c320eb412a415d869030e0aa3a5a25c17d34d198ab1b4404ffb9deaf3b4e2a5f
MD5 hash:
f66da6e8da0511113af4d902350a0dfb
SHA1 hash:
33f2af62b47a992dd8fa793420942f3ed7f905dc
SH256 hash:
53b108ca950652a2df74abe21859875d22499083b76fe401e923002fb48c5e61
MD5 hash:
906c6da9e4a73457510ca5f761ba4acb
SHA1 hash:
26a54f479c94d1aa60fecb2b630c60f234bf99ad
SH256 hash:
4cda72edadc15097c758dd5eb3bd5c6d66bb206672bafbe2ed9e57d5dd1c21f5
MD5 hash:
27d0e919bf3cabada69daf9e1ce05f21
SHA1 hash:
13d2adc3fa9cd72f5228fe2f75db407fe0ec8bbf
SH256 hash:
47df7bed600c35f4e6e907f1763b22f0470f6c9d2fb34cd3ca65ef308e654052
MD5 hash:
ddb5f02b836ac3c9a5cc2480dd3a6d35
SHA1 hash:
ac909418daa713829719f7a8eafaacf3b11e8785
SH256 hash:
497d6c2077bc72c42f5623e82c1da083b4541b69b428021dc8bb65661166ec1e
MD5 hash:
0de6d453bb0eeed2910795a70279d479
SHA1 hash:
7a7671111c5a29fdabf73fd916851cd3c21be82b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_smokeloader_a2
Author:pnx
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments