MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 505d85e3f2cc036bd585825a9bf3fd03a90a849d76dc29e842a1b3725d0b86ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments 1

SHA256 hash: 505d85e3f2cc036bd585825a9bf3fd03a90a849d76dc29e842a1b3725d0b86ce
SHA3-384 hash: 5685e1fee9909dca648413f2e6bf67accb0c586abcd4c57b038082d7e58ada5a39a4c5883598359298afde36bd8b2f3c
SHA1 hash: 8399edd9967a9b0a909e98f0ce311ebfa3402ea0
MD5 hash: c8c0bd9fb6afbc25324d767ff3f83b05
humanhash: eleven-california-speaker-eighteen
File name:c8c0bd9fb6afbc25324d767ff3f83b05
Download: download sample
Signature RustyStealer
File size:13'921'048 bytes
First seen:2023-02-16 04:38:59 UTC
Last seen:2023-02-16 08:32:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 881ebfb4b8b20e1f3b3657fb82622ad3 (5 x RustyStealer, 1 x RedLineStealer)
ssdeep 196608:cu3r9+J1zWgjWfVKyLsVXVe7Z2LXOVseTDCOBv9CpsN67lt4xAttU0FEFNPzHUdO:5MJ1zWgCcYYh+VsXOR9CpsAt4xUwNr0Q
Threatray 18 similar samples on MalwareBazaar
TLSH T135E6238A949650F4D9CA1430812BEABF73F11E6519D07C6EBFC47D98AE33AD26339113
TrID 40.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
12.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.0% (.EXE) Win32 Executable (generic) (4505/5/1)
5.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 78c6e4d9dafab8f9 (1 x njrat, 1 x RustyStealer)
Reporter zbetcheckin
Tags:32 exe RustyStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
264
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c8c0bd9fb6afbc25324d767ff3f83b05
Verdict:
Malicious activity
Analysis date:
2023-02-16 04:43:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Unknown
Threat level:
n/a  -.1/10
Confidence:
60%
Tags:
anti-debug overlay packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Amadey, Vidar
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Drops PE files with benign system names
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Self deletion via cmd or bat file
Sigma detected: Schedule system process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 809375 Sample: gXTzSM7LXG.exe Startdate: 16/02/2023 Architecture: WINDOWS Score: 100 101 Malicious sample detected (through community Yara rule) 2->101 103 Antivirus detection for URL or domain 2->103 105 Antivirus detection for dropped file 2->105 107 12 other signatures 2->107 10 gXTzSM7LXG.exe 21 2->10         started        15 svchost.exe 2->15         started        17 mnolyk.exe 2->17         started        process3 dnsIp4 95 149.154.167.99 TELEGRAMRU United Kingdom 10->95 97 95.216.194.51 HETZNER-ASDE Germany 10->97 99 2 other IPs or domains 10->99 81 C:\Users\user\AppData\...\rpcndfp[1].exe, PE32 10->81 dropped 83 C:\ProgramData\37022508915235310290.exe, PE32 10->83 dropped 135 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->135 137 Query firmware table information (likely to detect VMs) 10->137 139 Self deletion via cmd or bat file 10->139 145 4 other signatures 10->145 19 37022508915235310290.exe 3 10->19         started        23 cmd.exe 1 10->23         started        141 Multi AV Scanner detection for dropped file 15->141 143 Machine Learning detection for dropped file 15->143 file5 signatures6 process7 file8 71 C:\Users\user\AppData\Local\...\mnolyk.exe, PE32 19->71 dropped 121 Query firmware table information (likely to detect VMs) 19->121 123 Machine Learning detection for dropped file 19->123 125 Tries to evade analysis by execution special instruction (VM detection) 19->125 25 mnolyk.exe 20 19->25         started        30 conhost.exe 23->30         started        32 timeout.exe 1 23->32         started        signatures9 process10 dnsIp11 89 78.46.242.112 HETZNER-ASDE Germany 25->89 91 79.137.194.203 PSKSET-ASRU Russian Federation 25->91 93 65.108.55.152 ALABANZA-BALTUS United States 25->93 73 C:\Users\user\AppData\...\nahimicv3apo.exe, PE32+ 25->73 dropped 75 C:\Users\user\AppData\Local\...\regsvr32.exe, PE32 25->75 dropped 77 C:\Users\user\AppData\...\regsvr32[1].exe, PE32 25->77 dropped 79 C:\Users\user\AppData\...\nahimicv3apo[1].exe, PE32+ 25->79 dropped 127 Query firmware table information (likely to detect VMs) 25->127 129 Creates an undocumented autostart registry key 25->129 131 Machine Learning detection for dropped file 25->131 133 2 other signatures 25->133 34 regsvr32.exe 25->34         started        38 nahimicv3apo.exe 1 7 25->38         started        41 cmd.exe 1 25->41         started        43 schtasks.exe 1 25->43         started        file12 signatures13 process14 dnsIp15 67 C:\ProgramData\folerabikode\tiponalelef.exe, PE32 34->67 dropped 109 Multi AV Scanner detection for dropped file 34->109 111 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 34->111 113 Query firmware table information (likely to detect VMs) 34->113 119 2 other signatures 34->119 85 93.184.221.240 EDGECASTUS European Union 38->85 87 192.168.2.1 unknown unknown 38->87 69 C:\Users\user\AppData\Roaming\svchost.exe, PE32+ 38->69 dropped 115 Machine Learning detection for dropped file 38->115 117 Drops PE files with benign system names 38->117 45 cmd.exe 38->45         started        47 cmd.exe 38->47         started        49 conhost.exe 41->49         started        51 cmd.exe 1 41->51         started        53 cacls.exe 1 41->53         started        57 4 other processes 41->57 55 conhost.exe 43->55         started        file16 signatures17 process18 process19 59 conhost.exe 45->59         started        61 schtasks.exe 45->61         started        63 conhost.exe 47->63         started        65 timeout.exe 47->65         started       
Threat name:
Win32.Spyware.Vidar
Status:
Suspicious
First seen:
2023-02-14 21:09:58 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
21 of 39 (53.85%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:645 discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Vidar
Unpacked files
SH256 hash:
505d85e3f2cc036bd585825a9bf3fd03a90a849d76dc29e842a1b3725d0b86ce
MD5 hash:
c8c0bd9fb6afbc25324d767ff3f83b05
SHA1 hash:
8399edd9967a9b0a909e98f0ce311ebfa3402ea0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe 505d85e3f2cc036bd585825a9bf3fd03a90a849d76dc29e842a1b3725d0b86ce

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-16 04:39:06 UTC

url : hxxp://95.216.194.51/knowninfection.exe