MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 568b3a7273ccbb1436e42dd90f0541d7dc0da2a97944381ad0b31d7d437c4908. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 8


Intelligence 8 IOCs 1 YARA File information Comments

SHA256 hash: 568b3a7273ccbb1436e42dd90f0541d7dc0da2a97944381ad0b31d7d437c4908
SHA3-384 hash: e8727ca3274f35bb76783e3c3b1f1954b892f246e1817b4d7a7e033208d27fde97405b38ab4472d0d6f833aa82c087d3
SHA1 hash: 3a17e35120b1b6d9af676331288f7763b2a38252
MD5 hash: 166f2bc8f7949c714210d8b0aad0e30f
humanhash: maryland-robert-sierra-louisiana
File name:166F2BC8F7949C714210D8B0AAD0E30F.exe
Download: download sample
Signature DiamondFox
File size:2'623'480 bytes
First seen:2021-08-29 21:50:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBFuWMmtRozSLa2D5nPv2UdgCn8mhTRxtVxOmD2hiiAjIoUpD9ywFbG0J1k8ji:xu6KzlV6ozTFODDFoQRywFbG0J1kOi
Threatray 434 similar samples on MalwareBazaar
TLSH T1E3C533303DDFC0F2E9A20230E5151FB695FAE3941FA445D3A38085A92F78DE3D29B169
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://5.181.156.252/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.252/ https://threatfox.abuse.ch/ioc/201911/

Intelligence


File Origin
# of uploads :
1
# of downloads :
145
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
166F2BC8F7949C714210D8B0AAD0E30F.exe
Verdict:
No threats detected
Analysis date:
2021-08-29 21:51:43 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Sending a UDP request
Result
Threat name:
RedLine SmokeLoader Vidar Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 473562 Sample: 8YXAaXKbMZ.exe Startdate: 29/08/2021 Architecture: WINDOWS Score: 100 86 staticimg.youtuuee.com 2->86 88 172.94.15.211 VOXILITYGB United States 2->88 90 11 other IPs or domains 2->90 122 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->122 124 Multi AV Scanner detection for domain / URL 2->124 126 Antivirus detection for URL or domain 2->126 130 21 other signatures 2->130 10 8YXAaXKbMZ.exe 17 2->10         started        signatures3 128 Performs DNS queries to domains with low reputation 86->128 process4 file5 52 C:\Users\user\AppData\...\setup_install.exe, PE32 10->52 dropped 54 C:\Users\user\AppData\...\Fri11c82c0f30e.exe, PE32 10->54 dropped 56 C:\Users\user\...\Fri11c461e39d53e65a0.exe, PE32 10->56 dropped 58 12 other files (7 malicious) 10->58 dropped 13 setup_install.exe 1 10->13         started        process6 dnsIp7 102 104.21.43.244, 49725, 80 CLOUDFLARENETUS United States 13->102 104 sornx.xyz 172.67.190.165, 80 CLOUDFLARENETUS United States 13->104 106 127.0.0.1 unknown unknown 13->106 164 Performs DNS queries to domains with low reputation 13->164 166 Adds a directory exclusion to Windows Defender 13->166 17 cmd.exe 1 13->17         started        19 cmd.exe 13->19         started        21 cmd.exe 1 13->21         started        23 8 other processes 13->23 signatures8 process9 signatures10 26 Fri1176b8db38.exe 17->26         started        29 Fri11c461e39d53e65a0.exe 19->29         started        33 Fri1125717cea.exe 13 21->33         started        132 Adds a directory exclusion to Windows Defender 23->132 35 Fri11c82c0f30e.exe 23->35         started        37 Fri1175f1621969d3.exe 23->37         started        39 Fri1189d7c3d50d.exe 12 23->39         started        41 4 other processes 23->41 process11 dnsIp12 134 Multi AV Scanner detection for dropped file 26->134 136 Detected unpacking (changes PE section rights) 26->136 138 Machine Learning detection for dropped file 26->138 154 4 other signatures 26->154 43 explorer.exe 26->43 injected 108 cdn.discordapp.com 162.159.134.233, 443, 49712 CLOUDFLARENETUS United States 29->108 78 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 29->78 dropped 140 Antivirus detection for dropped file 29->140 48 LzmwAqmV.exe 29->48         started        116 4 other IPs or domains 33->116 80 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 33->80 dropped 142 May check the online IP address of the machine 33->142 144 Contains functionality to steal Chrome passwords or cookies 33->144 146 Tries to harvest and steal browser information (history, passwords, etc) 33->146 118 4 other IPs or domains 35->118 148 Disable Windows Defender real time protection (registry) 35->148 110 162.159.133.233, 443, 49714, 49730 CLOUDFLARENETUS United States 37->110 112 eduarroma.tumblr.com 39->112 114 eduarroma.tumblr.com 74.114.154.22, 443, 49715, 49720 AUTOMATTICUS Canada 39->114 120 7 other IPs or domains 41->120 82 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 41->82 dropped 84 C:\Users\user\AppData\...\Fri11a911b057a2.tmp, PE32 41->84 dropped 150 Creates processes via WMI 41->150 50 Fri11a911b057a2.tmp 41->50         started        file13 152 Performs DNS queries to domains with low reputation 112->152 signatures14 process15 dnsIp16 92 193.142.59.152 HOSTSLICK-GERMANYNL Netherlands 43->92 94 95.181.163.88 RACKTECHRU Russian Federation 43->94 100 2 other IPs or domains 43->100 60 C:\Users\user\AppData\Roaming\tcfjwjv, PE32 43->60 dropped 62 C:\Users\user\AppData\Local\Temp\DCC9.exe, PE32 43->62 dropped 64 C:\Users\user\AppData\Local\Temp\62E5.exe, PE32 43->64 dropped 72 2 other malicious files 43->72 dropped 156 System process connects to network (likely due to code injection or exploit) 43->156 158 Benign windows process drops PE files 43->158 160 Hides that the sample has been downloaded from the Internet (zone.identifier) 43->160 66 C:\Users\user\AppData\Local\Temp\jhuuee.exe, PE32+ 48->66 dropped 68 C:\Users\user\AppData\Local\...\chrome3.exe, PE32+ 48->68 dropped 70 C:\Users\user\AppData\Local\...\Pubdate.exe, PE32 48->70 dropped 74 3 other files (1 malicious) 48->74 dropped 162 Machine Learning detection for dropped file 48->162 96 the-flash-man.com 66.29.142.79, 49717, 80 ADVANTAGECOMUS United States 50->96 98 192.168.2.1 unknown unknown 50->98 76 4 other files (none is malicious) 50->76 dropped file17 signatures18
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-28 02:21:01 UTC
AV detection:
27 of 46 (58.70%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:706 botnet:pub botnet:rarani aspackv2 backdoor infostealer stealer trojan
Behaviour
Checks SCSI registry key(s)
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
193.56.146.78:51487
87.251.71.14:89
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
cd33cbdbf2a3dee74f23118ccadfbf3034004f40461e4b6c1899b9715ba22e5d
MD5 hash:
3a3d1628a7d9d15df7f4b0042243bdb9
SHA1 hash:
2672fc9a5aa7973abff1768330c7a05ebec4c102
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
1e47b0a87b714febf0f805a2c319a150cc8bd58d738669c76c975a64d40130ab
MD5 hash:
6cbca955ae2bb778cf9de6cef5d114a7
SHA1 hash:
527feb36a0cbd2c348df1862bb2d4516ed9bad6f
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
393d9ec0294735f5e08e0ec31dce291b3493cdefcd8b663efec34251e7ea16b1
MD5 hash:
a18d3259a7b6ce5e83625f440082fe6b
SHA1 hash:
e2032e8a5d05f90c1ac3508394abc89e8ac671bb
SH256 hash:
a2e7da3a4a1be91d19fe1b28515c2401c5200d3d88e7c8319cf22fc94342c133
MD5 hash:
180d36ebbd22866be67a6054d0511b1f
SHA1 hash:
dd21c42ea055da2a3e0f6bc839a867ad80c14e7e
SH256 hash:
75851ad163bfdee63e50605ab805ed8fcaaac701016bbafffd46570c619357ee
MD5 hash:
298c4dc55383774598d9e58569f90473
SHA1 hash:
b7e621d92b5cb269f2ee7a788fe96c2f60dfb9b4
SH256 hash:
3eacdc0104b9828754ebd1d024740ed0440292bd255e0d4cec8e7dac7fd8ade5
MD5 hash:
2a5c92d481a62b6e21e6eda66e7f6f83
SHA1 hash:
b328a766500bdb3350a40b77f7827ba4d6a25e05
SH256 hash:
3468617b55f79bcfd39abcab555eee7ec1e71021f2afa65cea500a357b683520
MD5 hash:
82b0b7f1acbeef7bfc42f5cb159cc978
SHA1 hash:
9bee245deb1f7cbc586e8c00836784ed9a35536f
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
367ad3088e9b253e5d61e89dfe3a378ea07b792e301a347f8c1f586d4ed13ea5
MD5 hash:
6bd463cde04f7e4361d09f2e699917d2
SHA1 hash:
4b36f77cc05782d8ba232c42615db8ddcda478ef
SH256 hash:
968484872156a64a88ebc15e1b245cf7accf9c8ba84125fbb57e03fcd488ef4a
MD5 hash:
6227abcd6a6522f011270375fe8556da
SHA1 hash:
12e2d82a124974b17cc71e300cbb6d3dded95917
SH256 hash:
93d9556fb993bf43229ceed67b4b959266ad08100df3159582bd97f3711ab84a
MD5 hash:
3c12c182ec88cd1f5f1bcdc3f6987a5b
SHA1 hash:
85fa74ba2ee19ff78c9ee8aaaf160c3f64f18744
SH256 hash:
2af9ea48ddf7bb6a2dcb3cfaec5ce28418ff49651edaac4528a7fe54eb6bd6df
MD5 hash:
46b6b7fe9cc9953304f6730ee7fc4fe0
SHA1 hash:
a944e40236928d9d68038a13b0c8e5e98796adbf
SH256 hash:
6ec2c47f2646041142756e5ceffc905d68a09109ab43b75e246782b0e81c2736
MD5 hash:
113ae81ee53281817e687294d1393b9d
SHA1 hash:
546cebf0e0f448739ab00531c18ed8af0b8f9629
SH256 hash:
fefb3886b9845d0e6a420a1a4b220d04ceed5159c40b445f0c6fad613cbcb3d2
MD5 hash:
709f5b1e80eb776882d6650c482b3565
SHA1 hash:
4d3b94f1898a13bc6018e2978d5a62c703c3e93b
SH256 hash:
568b3a7273ccbb1436e42dd90f0541d7dc0da2a97944381ad0b31d7d437c4908
MD5 hash:
166f2bc8f7949c714210d8b0aad0e30f
SHA1 hash:
3a17e35120b1b6d9af676331288f7763b2a38252
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments