MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 62e2a9186c1fab1693c2db86b723cbfd4d51accdd03d6baa324f1e02e78e5913. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



N-W0rm


Vendor detections: 12


Intelligence 12 IOCs 2 YARA File information Comments

SHA256 hash: 62e2a9186c1fab1693c2db86b723cbfd4d51accdd03d6baa324f1e02e78e5913
SHA3-384 hash: 955411afda73e75b7ee85a06da64b0c48517676b73034e362b6c3211085645fd873232baf3f5d505da4e8b97913f9f33
SHA1 hash: 8c5acb562c8aabb51dc7814b1261e3f7af4ab1c6
MD5 hash: a4a4e25eeb1021b9e19f4ba6922d73ff
humanhash: zulu-pennsylvania-fruit-fanta
File name:a4a4e25eeb1021b9e19f4ba6922d73ff.exe
Download: download sample
Signature N-W0rm
File size:5'990'947 bytes
First seen:2022-03-10 22:30:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:Jgetc5LSDOk9yCpMB4KNUEuDw44o++Ig3O8ZN2XO0bRZ5sNWJjbt7+CKcUVZ/itk:JPwYxyCOJNUnDflIUO8y3NMNW77tKHWC
Threatray 6'550 similar samples on MalwareBazaar
TLSH T17C5633834B65D58FFD76DEB0E24469B2B43FD17D0E38581E6784E42F6D861B2AC28702
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe N-W0rm


Avatar
abuse_ch
N-W0rm C2:
http://91.219.236.212/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.236.212/ https://threatfox.abuse.ch/ioc/393367/
193.106.191.67:44400 https://threatfox.abuse.ch/ioc/393504/

Intelligence


File Origin
# of uploads :
1
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe manuscrypt overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 587045 Sample: HQ3kyqBrJ7.exe Startdate: 10/03/2022 Architecture: WINDOWS Score: 100 85 37.230.138.66 ROCKETTELECOM-ASRU Russian Federation 2->85 87 s3.pl-waw.scw.cloud 151.115.10.1, 49775, 80 OnlineSASFR United Kingdom 2->87 89 3 other IPs or domains 2->89 133 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->133 135 Malicious sample detected (through community Yara rule) 2->135 137 Antivirus detection for URL or domain 2->137 139 17 other signatures 2->139 12 HQ3kyqBrJ7.exe 10 2->12         started        16 WmiPrvSE.exe 2->16         started        signatures3 process4 dnsIp5 109 192.168.2.1 unknown unknown 12->109 83 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->83 dropped 18 setup_installer.exe 20 12->18         started        file6 process7 file8 61 C:\Users\user\AppData\...\setup_install.exe, PE32 18->61 dropped 63 C:\Users\...\6226f0fbda801_Tue0632328383.exe, PE32 18->63 dropped 65 C:\Users\...\6226f0fae646d_Tue06818c0f.exe, PE32 18->65 dropped 67 15 other files (9 malicious) 18->67 dropped 21 setup_install.exe 1 18->21         started        process9 signatures10 147 Adds a directory exclusion to Windows Defender 21->147 24 cmd.exe 21->24         started        26 cmd.exe 1 21->26         started        28 cmd.exe 1 21->28         started        30 11 other processes 21->30 process11 signatures12 33 6226f0f1c18ed_Tue06e772026e23.exe 24->33         started        36 6226f0e2c8797_Tue066952f400d6.exe 1 26->36         started        38 6226f0e55e683_Tue06f02b88.exe 3 28->38         started        149 Adds a directory exclusion to Windows Defender 30->149 151 Disables Windows Defender (via service or powershell) 30->151 40 6226f0e721bf9_Tue06f5bd190.exe 12 30->40         started        43 6226f0f73bbbd_Tue067d5c0ed2.exe 30->43         started        46 6226f0f590473_Tue0647e61dff.exe 30->46         started        48 7 other processes 30->48 process13 dnsIp14 111 Multi AV Scanner detection for dropped file 33->111 113 Detected unpacking (changes PE section rights) 33->113 115 Machine Learning detection for dropped file 33->115 131 4 other signatures 33->131 50 explorer.exe 33->50 injected 117 Disables Windows Defender (via service or powershell) 36->117 55 cmd.exe 36->55         started        119 Antivirus detection for dropped file 38->119 121 Sample uses process hollowing technique 38->121 123 Injects a PE file into a foreign processes 38->123 97 iplogger.org 148.251.234.83, 443, 49771 HETZNER-ASDE Germany 40->97 99 www.icodeps.com 149.28.253.196, 443, 49769 AS-CHOOPAUS United States 40->99 125 May check the online IP address of the machine 40->125 101 ip-api.com 208.95.112.1, 49772, 80 TUT-ASUS United States 43->101 103 45.136.151.102 ENZUINC-US Latvia 43->103 73 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 43->73 dropped 105 45.129.96.174 GMHOST-EE Estonia 46->105 127 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 46->127 107 gardnersoftwera.com 188.114.96.7, 49770, 80 CLOUDFLARENETUS European Union 48->107 75 C:\Users\...\6226f0f086711_Tue067f43401e.tmp, PE32 48->75 dropped 77 C:\Users\...\6226f0fbda801_Tue0632328383.tmp, PE32 48->77 dropped 79 C:\Users\user\AppData\Local\...\XzIiuII.UoW, PE32 48->79 dropped 81 413558ff-0005-48d9-adbc-f4e66b3aa23d.exe, PE32 48->81 dropped 129 Obfuscated command line found 48->129 57 6226f0fae646d_Tue06818c0f.exe 48->57         started        file15 signatures16 process17 dnsIp18 91 37.75.37.31 VFM-ASVodafoneMaltaLtdASMT Malta 50->91 93 80.66.64.208 VAD-SRL-AS1MD Russian Federation 50->93 95 7 other IPs or domains 50->95 69 C:\Users\user\AppData\Roaming\rafdvah, PE32 50->69 dropped 71 C:\Users\user\AppData\Local\Temp\F53A.exe, PE32 50->71 dropped 141 Benign windows process drops PE files 50->141 143 Hides that the sample has been downloaded from the Internet (zone.identifier) 50->143 145 Disables Windows Defender (via service or powershell) 55->145 59 powershell.exe 55->59         started        file19 signatures20 process21
Threat name:
Win32.PUA.PassView
Status:
Malicious
First seen:
2022-03-09 12:37:00 UTC
File Type:
PE (Exe)
Extracted files:
301
AV detection:
31 of 42 (73.81%)
Threat level:
  1/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:smokeloader family:socelars aspackv2 backdoor discovery loader spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks installed software on the system
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
OnlyLogger Payload
OnlyLogger
SmokeLoader
Socelars
Socelars Payload
Malware Config
C2 Extraction:
https://sa-us-bucket.s3.us-east-2.amazonaws.com/asdhjk/
http://pjure.at/upload/
http://puffersweiven.com/upload/
http://algrcabel.ru/upload/
http://pelangiqq99.com/upload/
http://elsaunny.com/upload/
http://korphoto.com/upload/
http://hangxachtaythodoan.com/upload/
http://pkodev.net/upload/
http://go-piratia.ru/upload/
http://piratia.su/upload/
Unpacked files
SH256 hash:
d00d8f312c6c757115fcd9c3f010197cbb98ed451ff879c9c93b25f4b3457815
MD5 hash:
68237153ebe77095442b437998b57388
SHA1 hash:
9a7b0fb5b4d9ea1e40c7f011d63ba0a57b4d3d51
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
e718a2f50e72d94ee2c9455603d98f67e7705aefc283351c182b5e503d59f6d8
MD5 hash:
5264c8567cf762e7cd37971a88b28a45
SHA1 hash:
ffd23a453665086713bbeccf0029c5b026d4c47e
SH256 hash:
55c78f98d6802e6fdb850f7d3c22aef482ca683e3d66f5b36a9a64857af36fa5
MD5 hash:
a552088050c52b999c65f3be1217386a
SHA1 hash:
c78f858657e0e81ed156113f5cc3a616c6d8208c
SH256 hash:
e81ef9e880d0fd5f8cd245609c80be74f001d9e17480529277a30408b1f1d842
MD5 hash:
05994e885eb545722eba5f2016e31d2b
SHA1 hash:
ad7b0377d44c9b6783014ceb37482339ce09bdd2
SH256 hash:
ffa44bbeb098e3190a5d207ecb1914733c7532522c16d9c2ebbbdc1fd19fb634
MD5 hash:
7ab56c40763c2c0d0a1ec00695a35bb0
SHA1 hash:
a79a0fef03ef72b31a074b57491d4b8afe080d37
SH256 hash:
69fa77836b0217cfe10ef3c5bafaefb05e56145b415dc88bd163d35efcac408a
MD5 hash:
31805a8cd198c312435af4585547f36e
SHA1 hash:
a705429e315d84c9b9b5a84d148408129c2e0cc9
SH256 hash:
9ef0a4c0a0f7106d3384adc2379680619a9e534be743c58270f212611837573c
MD5 hash:
69ccecd382f01df450ad6c6c6105d010
SHA1 hash:
98f10f60395bb3724f38bf8794e2ad30e0e1b3b4
SH256 hash:
a0820a0a7fa78ad41eb135a41db4355eed4d2291ce4414161d20f4dd01eb56a3
MD5 hash:
4085bcdabf1ff6b77e8c40d8c1d7c597
SHA1 hash:
5a9e25997147602f27fb502a03479b7097d203e1
SH256 hash:
247ee918d75188bbadec976fbdb5f270d49341ee27dce00f7c1946e51897cd4d
MD5 hash:
b0d72bc9c46df0dbf88e0df775813501
SHA1 hash:
1d02f9a1fb01c19e339e180bb0f69c1a7495a64b
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
8301e8ca662d5507a8b282b82db8cb059b7be1d3f7be59166d1e75aec5fa24c4
MD5 hash:
f40e3ed77a5ff9624a1c8dc136d9b349
SHA1 hash:
5f9924e388f0e825b7397c6c276056d712c9e61a
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
e16f68152fa7be7dd8aff55aeff59ddeae48b4b95e3d3ba33016f65e632a6706
MD5 hash:
a8e7034f8220f722f4aca2edcc9c42eb
SHA1 hash:
656d7d88fffd3820deb1741564807990c3851114
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
7743544b217261f5fb578b788fe84c501320b4aa44f5c1162816b8f1dc1c864f
MD5 hash:
3a427813bcaac7ee86f88e8e01bc955f
SHA1 hash:
606e4b343fbb47bbb5fd9a92e7654ca23cf1695f
SH256 hash:
573b56bce6efdff56eb8d228810b210b02da286b00c3b1d1d4dcffb1084acc4e
MD5 hash:
82b20280e329148c25fae4c7054c5b89
SHA1 hash:
deeaca8e27f4646c00928a1d59714d202cf97f45
SH256 hash:
9703314040557dd7df67c13394b2dbd4302aacc8482f29453205a8f847fdffe7
MD5 hash:
b79aad87075c8290eda975dfe3463361
SHA1 hash:
3890ed85fb602c5e669dddd420930f2096449111
SH256 hash:
8bd855a3bedd17680ebb9a6ffc5b76f7c268e1e0d05274ced8a3616a419f6021
MD5 hash:
53c3c1d2d756c2a47b7ed9d5f9eaa48a
SHA1 hash:
6812317f4226307ec4916e16f2e9841dcdfaf878
SH256 hash:
0c7de2d4f0ab1870eab9bfd69618958600c52541d1bae3f2e6e752ccd5c2aee9
MD5 hash:
173ca6bd8897e829080b44681aea471e
SHA1 hash:
a3b64e06112c21d54124817751eb8e86faa53124
SH256 hash:
83da05e18535d7285286531901ab8fe941061300b8c58a3a78c8c1ffa765e523
MD5 hash:
eb8ea98e30d9bf2bff5201090263a5ea
SHA1 hash:
af0f7369adfcbe3395faaa36c9688275db04c56e
SH256 hash:
aa854df1095119f1dfa6f2a447fbe6414728d9ca799ff693ad4cb44fe6d4af56
MD5 hash:
a189383ec332ef6cfa26302e3f2cb61b
SHA1 hash:
c49e4a80833f7be5b3226dce35a3be59ba4314b1
SH256 hash:
62e2a9186c1fab1693c2db86b723cbfd4d51accdd03d6baa324f1e02e78e5913
MD5 hash:
a4a4e25eeb1021b9e19f4ba6922d73ff
SHA1 hash:
8c5acb562c8aabb51dc7814b1261e3f7af4ab1c6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments