MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 506aa9e26a8962c561e5486356913ee40e53e5ea2434363e4b5827c126b0ce6c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XFilesStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 506aa9e26a8962c561e5486356913ee40e53e5ea2434363e4b5827c126b0ce6c
SHA3-384 hash: c674f7856f1549a197ece31f7384fcf763bc0c5fdb6fd687396e76f1ba20ae1aa3669a504998a011e73b7c01ef54599f
SHA1 hash: 0a0a0b86ec7374efdbe2fc01254c962fa9c2243c
MD5 hash: 7944f1f915ea06c164cd7f94633f4b7a
humanhash: double-potato-florida-september
File name:PO#MP2218_potvrd 220623052GZU_170914140GZU-001_CDR V4 z3.exe
Download: download sample
Signature XFilesStealer
File size:717'312 bytes
First seen:2022-07-26 16:15:59 UTC
Last seen:2022-07-26 17:03:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:7kCyvdcmdFTjrcZYy/cdsoE4XkwxCcG9jGDWmRMJ9ZqMfa+0Y1k+PQR9w:7kf6mzriYy/cd7E6kidG9j4WmRnn+0Yr
Threatray 210 similar samples on MalwareBazaar
TLSH T1C6E4130BC8B40AF5C77061F7A6217592E3237201FE329278E7B93895E5F71794D462B2
TrID 63.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon d0c8c8c8ece4d2c8 (1 x XFilesStealer)
Reporter AndreGironda
Tags:CryptoWallets exe XFilesStealer


Avatar
AndreGironda
MITRE T1566.001
Date: 25 Jul 2022 09:30-10:00 +0200
Received: from hvuxqgwo.hotdealsdigest.com (185.246.220.207)
From: MR. BEN- LIEN MAU LAM<purchase@hotdealsdigest.com>
Subject: Order#VMH#20181st
Message-ID: <20220725095851.9BF705DAEB62C209@hotdealsdigest.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_0012_0DF69354.B04C1FD7"
Return-Path: purchase@hotdealsdigest.com
Attachment Name: VMH#20181.pdf
PDF SHA256: d1250e0fabac80419576c0ba507fdabc36a55b81252830a9bb8279f76a402613
Stage URL: hXXps://lorritroughton[.]com/AdobePdfViewer/neworder.lzh
Rarfile SHA256: 98e97d3da7fe6ba03c5951864cb7012e96320189d7a176b508ba2ea594a9523d
Uncompressed Executable Name: PO#MP2218_potvrd 220623052GZU_170914140GZU-001_CDR V4 z3.exe
Executable SHA266: 506aa9e26a8962c561e5486356913ee40e53e5ea2434363e4b5827c126b0ce6c
Unpacked Executable SHA256: 6d8250885b38619aef68f7ed7d7be6b862cf96e6c0c1e112a4d587aee2157155

Intelligence


File Origin
# of uploads :
2
# of downloads :
560
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
92 / 100
Signature
.NET source code contains potential unpacker
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 673689 Sample: PO#MP2218_potvrd 220623052G... Startdate: 26/07/2022 Architecture: WINDOWS Score: 92 46 youtube-ui.l.google.com 2->46 48 www.youtube.com 2->48 50 22 other IPs or domains 2->50 68 Malicious sample detected (through community Yara rule) 2->68 70 .NET source code contains potential unpacker 2->70 72 Machine Learning detection for sample 2->72 74 6 other signatures 2->74 8 PO#MP2218_potvrd 220623052GZU_170914140GZU-001_CDR V4 z3.exe 1 4 2->8         started        12 firefox.exe 73 2->12         started        15 chrome.exe 17 222 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 40 C:\Users\user\AppData\Local\PhotoStudio.exe, PE32+ 8->40 dropped 42 C:\Users\...\PhotoStudio.exe:Zone.Identifier, ASCII 8->42 dropped 44 PO#MP2218_potvrd 2...1_CDR V4 z3.exe.log, ASCII 8->44 dropped 76 Encrypted powershell cmdline option found 8->76 78 Writes to foreign memory regions 8->78 80 Modifies the context of a thread in another process (thread injection) 8->80 82 Injects a PE file into a foreign processes 8->82 19 powershell.exe 8->19         started        21 InstallUtil.exe 8->21         started        58 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 50752, 50760, 53736 GOOGLEUS United States 12->58 60 prod.balrog.prod.cloudops.mozgcp.net 35.244.181.201, 443, 50744 GOOGLEUS United States 12->60 66 8 other IPs or domains 12->66 23 firefox.exe 1 12->23         started        25 firefox.exe 12->25         started        36 3 other processes 12->36 62 192.168.2.1 unknown unknown 15->62 64 239.255.255.250 unknown Reserved 15->64 27 chrome.exe 30 15->27         started        30 firefox.exe 11 17->30         started        32 conhost.exe 17->32         started        34 PO#MP2218_potvrd 220623052GZU_170914140GZU-001_CDR V4 z3.exe 17->34         started        file6 signatures7 process8 dnsIp9 38 conhost.exe 19->38         started        52 accounts.google.com 142.250.185.109, 443, 49559, 49772 GOOGLEUS United States 27->52 54 www3.l.google.com 142.250.185.142, 443, 57471, 58898 GOOGLEUS United States 27->54 56 13 other IPs or domains 27->56 process10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-07-26 16:16:09 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
4
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Unpacked files
SH256 hash:
506aa9e26a8962c561e5486356913ee40e53e5ea2434363e4b5827c126b0ce6c
MD5 hash:
7944f1f915ea06c164cd7f94633f4b7a
SHA1 hash:
0a0a0b86ec7374efdbe2fc01254c962fa9c2243c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly

File information


The table below shows additional information about this malware sample such as delivery method and external references.

XFilesStealer

Executable exe 506aa9e26a8962c561e5486356913ee40e53e5ea2434363e4b5827c126b0ce6c

(this sample)

Comments