MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d6904b252c292f5aefe176877720e6e8520c977c9f27ba46c92e5a0b6796016. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 7 File information Comments

SHA256 hash: 4d6904b252c292f5aefe176877720e6e8520c977c9f27ba46c92e5a0b6796016
SHA3-384 hash: 632ea0b94b77649aa4ddeb472035a7eb409c2a2c0ada65b2fbc580f1b73b9d88cbae7a9b7821577aad2ffd6e53c04743
SHA1 hash: 0f69b4fcbda90184075b84d12217abbd0c07d704
MD5 hash: a56c0274e6ea9bd32141634a92052d91
humanhash: ink-florida-zulu-alanine
File name:A56C0274E6EA9BD32141634A92052D91.exe
Download: download sample
Signature DiamondFox
File size:4'349'459 bytes
First seen:2021-08-24 04:55:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:x9Y2YE0JHHIvNIDwBlb7yTglmdg7T0FHxhXU0KusqWmF6soR6R:xa22gNIDWlllsgshXDKOyso0R
Threatray 399 similar samples on MalwareBazaar
TLSH T1DE1633053BDAC0FBF213153165447BFBE6ADC3945A202EC32367AF1A0DB5A83613A567
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://188.119.112.104/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://188.119.112.104/ https://threatfox.abuse.ch/ioc/193472/

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
A56C0274E6EA9BD32141634A92052D91.exe
Verdict:
No threats detected
Analysis date:
2021-08-24 04:57:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 470389 Sample: rj2b9a7ojM.exe Startdate: 24/08/2021 Architecture: WINDOWS Score: 100 90 mfBkjRLTfwLSsveoSyZ.mfBkjRLTfwLSsveoSyZ 2->90 92 google.vrthcobj.com 2->92 116 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->116 118 Multi AV Scanner detection for domain / URL 2->118 120 Antivirus detection for URL or domain 2->120 122 10 other signatures 2->122 11 rj2b9a7ojM.exe 17 2->11         started        14 svchost.exe 2->14         started        16 svchost.exe 1 2->16         started        signatures3 process4 file5 64 C:\Users\user\AppData\...\setup_install.exe, PE32 11->64 dropped 66 C:\Users\user\...\Fri17f148864b7f11.exe, PE32+ 11->66 dropped 68 C:\Users\user\...\Fri17e57b57304ad6467.exe, PE32 11->68 dropped 70 12 other files (7 malicious) 11->70 dropped 18 setup_install.exe 1 11->18         started        22 WerFault.exe 14->22         started        process6 dnsIp7 94 hsiens.xyz 172.67.142.91, 49706, 80 CLOUDFLARENETUS United States 18->94 96 127.0.0.1 unknown unknown 18->96 98 192.168.2.1 unknown unknown 18->98 124 Performs DNS queries to domains with low reputation 18->124 126 Adds a directory exclusion to Windows Defender 18->126 24 cmd.exe 1 18->24         started        26 cmd.exe 1 18->26         started        29 cmd.exe 1 18->29         started        31 8 other processes 18->31 signatures8 process9 signatures10 33 Fri1743bf1fe022.exe 24->33         started        128 Obfuscated command line found 26->128 130 Uses ping.exe to sleep 26->130 132 Uses ping.exe to check the status of other devices and networks 26->132 134 Adds a directory exclusion to Windows Defender 26->134 37 powershell.exe 26 26->37         started        39 Fri17935370d9f965.exe 29->39         started        41 Fri17e57b57304ad6467.exe 2 31->41         started        43 Fri17f148864b7f11.exe 1 13 31->43         started        46 Fri17bbd34709019a06.exe 31->46         started        48 4 other processes 31->48 process11 dnsIp12 76 37.0.10.237, 49711, 49721, 80 WKD-ASIE Netherlands 33->76 78 37.0.10.214, 49710, 49722, 80 WKD-ASIE Netherlands 33->78 84 2 other IPs or domains 33->84 102 Multi AV Scanner detection for dropped file 33->102 104 May check the online IP address of the machine 33->104 106 Tries to harvest and steal browser information (history, passwords, etc) 33->106 108 Disable Windows Defender real time protection (registry) 33->108 110 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 39->110 112 Checks if the current machine is a virtual machine (disk enumeration) 39->112 50 explorer.exe 39->50 injected 114 Creates processes via WMI 41->114 52 Fri17e57b57304ad6467.exe 41->52         started        80 ip-api.com 208.95.112.1, 49709, 80 TUT-ASUS United States 43->80 86 2 other IPs or domains 43->86 72 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 43->72 dropped 82 162.159.134.233, 443, 49716 CLOUDFLARENETUS United States 46->82 74 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 46->74 dropped 88 4 other IPs or domains 48->88 56 dllhost.exe 48->56         started        58 cmd.exe 48->58         started        file13 signatures14 process15 dnsIp16 100 live.goatgame.live 172.67.222.125, 443, 49701 CLOUDFLARENETUS United States 52->100 62 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 52->62 dropped 60 conhost.exe 52->60         started        file17 process18
Threat name:
Win32.Adware.C2Lop
Status:
Malicious
First seen:
2021-08-21 06:46:33 UTC
AV detection:
27 of 46 (58.70%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pub1 aspackv2 backdoor infostealer persistence stealer themida trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
viacetequn.site:80
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Unpacked files
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
79b1034fbd1a2585ec9b5063d19c75e767fb7106dd1f187698ba75e89a45b77b
MD5 hash:
bb94aaa84e62ceee3755d0d38a6da276
SHA1 hash:
ceecfe7337264866de12591fe1623869d4c69560
SH256 hash:
8a77dd50b720322088fbe92aeba219cc744bd664ff660058b1949c3b9b428bac
MD5 hash:
d1d4b4d26a9b9714a02c252fb46b72ce
SHA1 hash:
af9e34a28f8f408853d3cd504f03ae43c03cc24f
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
a575f4eb4a0b31ccf16a0367b376874479171cad9eeaff778fc4559c0822d22f
MD5 hash:
5c18abdf10111e05706c983434471d55
SHA1 hash:
8cb87a3477b9765c9600aa30925b99c11625a6eb
SH256 hash:
2f00e60b80f5edbc6be5dacd11de52e18f39cd1f464be1344804bb3b0d69686c
MD5 hash:
5943029ebd8bcde2211e40677b49e692
SHA1 hash:
6dc37b59bfad6b6c1fdbf4b6436a685a040cc540
SH256 hash:
4f5bf43cbbd0878bac694b43e84f43f663c747a056272a2c0b45725da4ae0b98
MD5 hash:
6e3eb2755307ea43113d6df67db6e1bc
SHA1 hash:
2ea7cb79694afea549f48585c02cb6c8250e6924
SH256 hash:
c4bace015836fa508eda15ebc9685a1eae26fdb0cc8c469387e4589e84bc192b
MD5 hash:
7f5e4c6a29d01b04aa28400808ea5e67
SHA1 hash:
163b99d106923b3b0a6e2f1e7670c0baf7c92ee8
SH256 hash:
97b4692e7192f14777afd63462450bfd8d8431f5b151161eaaccb03cff8dffea
MD5 hash:
6100f4e88679785fa71df9ca6930c788
SHA1 hash:
3cdcc4fc865e7d2eee3d6be07d8a4c1ef570fd30
SH256 hash:
2aa0dc0322b5aa4cf4c42d992eb8d629b66893df6f17efa4eefe468f58270d42
MD5 hash:
162425d978c614c190b4583ef5b198ff
SHA1 hash:
28c624e658dece01230ecfc2e80753ee1bbb1690
SH256 hash:
dbc912268446cd4f0e9d114e3d071cfc7825186cbc175965555458d6be235571
MD5 hash:
83827d744284b6a5e2b6f8212cd50b7f
SHA1 hash:
023ccef4cf91e60af8d463ce0774ab38d617c6b1
SH256 hash:
d47bf5e79c98c53a00f035a2e5f1e3d3073f8ecba7709d29b919a6384206677b
MD5 hash:
4ada754e7dc6dbe4d20d7e28be144f5a
SHA1 hash:
841c6dfc01019449df03142b9c93ba50a50c0d30
SH256 hash:
b0d1db3986642556c34314f3971e6a7925e66cef7001b3d2959eb6ca8565b6fb
MD5 hash:
429f4f88cdb9eb6d61a17c825be6791b
SHA1 hash:
72b9aa8afd1097b7cf9f5f8b897e166821db598d
SH256 hash:
4d6904b252c292f5aefe176877720e6e8520c977c9f27ba46c92e5a0b6796016
MD5 hash:
a56c0274e6ea9bd32141634a92052d91
SHA1 hash:
0f69b4fcbda90184075b84d12217abbd0c07d704
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments