MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52d2303ef0ca3af61a62ab3041abdd1782189394a97777c7d5d9b488b85f1cdd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: 52d2303ef0ca3af61a62ab3041abdd1782189394a97777c7d5d9b488b85f1cdd
SHA3-384 hash: db809759779ac9ad95acb91f3038008c3b110a8cea182d76aba6c7a08c6803ca254c222bc1e6ce3b58d7ce1f9313d4e5
SHA1 hash: ecf49125ae5fbab3046a36550c7e46074acbfdb2
MD5 hash: 28048a470181ea26c44efccc5613248d
humanhash: leopard-seventeen-whiskey-black
File name:28048A470181EA26C44EFCCC5613248D.exe
Download: download sample
Signature Adware.FileTour
File size:4'561'715 bytes
First seen:2021-08-23 23:25:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yuROg/xvMXxNE+yK7cRAMM3mLwhd9Rb050ldg+nmJbeLMYBHSAkUBIi2:yuRb/xArEKwyMM38wtR450Dg+mVAHS2S
TLSH T1AE263398120DE033E4BA363217219F9F5F57F44B1BE43BAA9790015CA26E6E7D91DE30
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
http://188.119.112.104/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://188.119.112.104/ https://threatfox.abuse.ch/ioc/193472/

Intelligence


File Origin
# of uploads :
1
# of downloads :
199
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
28048A470181EA26C44EFCCC5613248D.exe
Verdict:
No threats detected
Analysis date:
2021-08-23 23:27:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a UDP request
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 470300 Sample: IFsT94qu8G.exe Startdate: 24/08/2021 Architecture: WINDOWS Score: 100 78 172.67.222.125 CLOUDFLARENETUS United States 2->78 80 144.202.76.47 AS-CHOOPAUS United States 2->80 98 Multi AV Scanner detection for domain / URL 2->98 100 Antivirus detection for URL or domain 2->100 102 Antivirus detection for dropped file 2->102 104 13 other signatures 2->104 10 IFsT94qu8G.exe 10 2->10         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->46 dropped 13 setup_installer.exe 18 10->13         started        process6 file7 48 C:\Users\user\AppData\...\setup_install.exe, PE32 13->48 dropped 50 C:\Users\user\AppData\...\Sat04a3dff8dec.exe, PE32 13->50 dropped 52 C:\Users\user\AppData\...\Sat0489e5e7edba.exe, PE32 13->52 dropped 54 13 other files (1 malicious) 13->54 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 74 172.67.142.91 CLOUDFLARENETUS United States 16->74 76 127.0.0.1 unknown unknown 16->76 96 Adds a directory exclusion to Windows Defender 16->96 20 cmd.exe 16->20         started        22 cmd.exe 1 16->22         started        24 cmd.exe 1 16->24         started        27 6 other processes 16->27 signatures10 process11 signatures12 29 Sat04a3dff8dec.exe 20->29         started        34 Sat046b489ca6a4ca7b.exe 86 22->34         started        106 Obfuscated command line found 24->106 108 Uses ping.exe to sleep 24->108 110 Uses ping.exe to check the status of other devices and networks 24->110 112 Adds a directory exclusion to Windows Defender 24->112 36 powershell.exe 24 24->36         started        38 Sat0489e5e7edba.exe 27->38         started        40 Sat044149d0d9a89f.exe 1 13 27->40         started        42 Sat0451bd044df656.exe 2 27->42         started        44 Sat043dfd5d2de5535b.exe 27->44         started        process13 dnsIp14 82 185.233.185.134 YURTEH-ASUA Russian Federation 29->82 84 37.0.10.214 WKD-ASIE Netherlands 29->84 90 12 other IPs or domains 29->90 56 C:\Users\user\AppData\Local\...\file1[1].exe, PE32 29->56 dropped 58 VerminateMechanize...-08-18_15-57[1].bmp, PE32 29->58 dropped 60 C:\Users\user\AppData\Local\...\Setup2[1].exe, PE32 29->60 dropped 70 53 other files (15 malicious) 29->70 dropped 114 Tries to harvest and steal browser information (history, passwords, etc) 29->114 116 Disable Windows Defender real time protection (registry) 29->116 86 188.34.200.103 HETZNER-ASDE Germany 34->86 92 2 other IPs or domains 34->92 62 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 34->62 dropped 64 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 34->64 dropped 66 C:\Users\user\AppData\...\mozglue[1].dll, PE32 34->66 dropped 72 9 other files (none is malicious) 34->72 dropped 118 Detected unpacking (changes PE section rights) 34->118 120 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->120 122 Tries to steal Crypto Currency Wallets 34->122 124 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 38->124 126 Checks if the current machine is a virtual machine (disk enumeration) 38->126 88 208.95.112.1 TUT-ASUS United States 40->88 94 3 other IPs or domains 40->94 68 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 40->68 dropped file15 signatures16
Threat name:
Win32.Downloader.Upatre
Status:
Malicious
First seen:
2021-08-21 16:52:06 UTC
AV detection:
29 of 46 (63.04%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pub1 aspackv2 backdoor infostealer persistence stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
viacetequn.site:80
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
1d53a1741021d44478a5beea3fe9c2dad1d06f432f241acb36e6b9b31660c814
MD5 hash:
bbf07901d12da487eb9edc8a8f1d33c8
SHA1 hash:
f5564a97cc708c758acbb658332a41997d89aa7a
SH256 hash:
48393824b9d527437523fdfa39277741b6de9aeb2d0ab5b4658c8fc810d8285f
MD5 hash:
8bd9f53743d36354099b2dad981c18d1
SHA1 hash:
f041ffa5ad8810ce562e568d10cbd19dfb83fd82
SH256 hash:
2078a576a9637fb6237012e6481636a0bbcfa10c471775ea79e8c000097a5e55
MD5 hash:
c60896c2dccee4e0324abaa7911921d3
SHA1 hash:
dbccd8c86249d79f97aba3de5c161f73f92595b8
SH256 hash:
8a77dd50b720322088fbe92aeba219cc744bd664ff660058b1949c3b9b428bac
MD5 hash:
d1d4b4d26a9b9714a02c252fb46b72ce
SHA1 hash:
af9e34a28f8f408853d3cd504f03ae43c03cc24f
SH256 hash:
5124f82d0fb94de4f3b1355f19535c59cc8bc06c5b35eddb9fed43441fbcd79d
MD5 hash:
72c1682d1337cc7fcc20e008a46e4256
SHA1 hash:
af6eabab193b1e42c381b1dd8ce29a263cda0781
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
b73dce9f851fc39502985d4d119de21d843c03226f48984594a8e7467b48aefb
MD5 hash:
1950a92d574528bacc2d384511f80234
SHA1 hash:
3a65ba990cb4d6c1916a5d1aaa76af5b6fe9f840
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
929b382d80c3692641b101f377edfb896f9e854aad529f0c6f2e1719e2b4a166
MD5 hash:
583228c71037b5b5939be84d13792490
SHA1 hash:
e81ae8ce14f5e9ddc47f1c1588cda81ac23b5905
SH256 hash:
f536143ea704c3de7f77e6f0e7d348512877eca0de4715827dd8ebc766bbeb6f
MD5 hash:
e9512e37aec41b010841feac89242f09
SHA1 hash:
5416e0ac56a82b249374e1caf73e2faad4ebda1d
SH256 hash:
315a5e3c289faa4ea5302d44a7f60c6aecb7989971088bbfaa7e055279ad55e6
MD5 hash:
5619152439e0be78e8a71da9da008826
SHA1 hash:
dfd6d659c8eef61b7bcce42a56b5f9fc57ee1089
SH256 hash:
94c9858c3e1e4ee1817106b83c2c935696af32179a28e98a5002d5b78fe37e32
MD5 hash:
61acf86abfa3e20fd7b0fc29852560d5
SHA1 hash:
3bca11813ede01d256d76c05d5fb0218c7b7c756
SH256 hash:
04f1c7c1a9f3b9cbead29de322b52cec6748fab0a15fd503419d5b6df3aad587
MD5 hash:
acf413c5f92c24ef43640f6d95cbc533
SHA1 hash:
9e10e3a620b5dd2d47a3a25d8d05f68a159dff0b
SH256 hash:
52d2303ef0ca3af61a62ab3041abdd1782189394a97777c7d5d9b488b85f1cdd
MD5 hash:
28048a470181ea26c44efccc5613248d
SHA1 hash:
ecf49125ae5fbab3046a36550c7e46074acbfdb2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments