MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 679d4240ec3562404c1222d91bb2594cb90843b5aec479ce75bd47d4a4e8b780. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 14 File information Comments

SHA256 hash: 679d4240ec3562404c1222d91bb2594cb90843b5aec479ce75bd47d4a4e8b780
SHA3-384 hash: 94c648bd59d1d760f8905707b938ee6b77bc506e8c613c749e27de4f65b539345e5771c7bbb471b5c6c3f3292e6e0c9e
SHA1 hash: c67ab56c6d851e3feae04261cbbd31c667448079
MD5 hash: a7cb4a676cab7532471fd9dacfa5778c
humanhash: alaska-bluebird-nevada-cardinal
File name:a7cb4a676cab7532471fd9dacfa5778c.exe
Download: download sample
Signature Adware.FileTour
File size:3'384'269 bytes
First seen:2021-05-27 18:50:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xyCvLUBsgqEPkbbFt5YVI7+5EpXLzYE4O1LJR9nqv3Y:xDLUCgqkm30I7IO1lso
Threatray 10 similar samples on MalwareBazaar
TLSH C1F5335132F284F6EA91057139442F7295FDC3D997308AABB3A4D40E5F7AC43723A68E
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
http://162.55.189.102/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://162.55.189.102/ https://threatfox.abuse.ch/ioc/65642/

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a7cb4a676cab7532471fd9dacfa5778c.exe
Verdict:
No threats detected
Analysis date:
2021-05-27 21:11:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Sending a UDP request
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 425790 Sample: 8pMF3KenX9.exe Startdate: 27/05/2021 Architecture: WINDOWS Score: 100 155 Multi AV Scanner detection for domain / URL 2->155 157 Antivirus detection for URL or domain 2->157 159 Antivirus detection for dropped file 2->159 161 6 other signatures 2->161 11 8pMF3KenX9.exe 15 2->11         started        process3 file4 107 C:\Users\user\AppData\...\setup_install.exe, PE32 11->107 dropped 109 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 11->109 dropped 111 C:\Users\user\AppData\Local\...\metina_6.exe, PE32 11->111 dropped 113 10 other files (5 malicious) 11->113 dropped 14 setup_install.exe 1 11->14         started        process5 dnsIp6 149 8.8.8.8 GOOGLEUS United States 14->149 151 172.67.199.99 CLOUDFLARENETUS United States 14->151 153 127.0.0.1 unknown unknown 14->153 175 Detected unpacking (changes PE section rights) 14->175 18 cmd.exe 1 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 8 other processes 14->24 signatures7 process8 process9 26 metina_4.exe 2 18->26         started        29 metina_3.exe 7 20->29         started        31 metina_2.exe 1 22->31         started        34 metina_1.exe 37 24->34         started        37 metina_5.exe 1 1 24->37         started        39 metina_6.exe 24->39         started        41 metina_7.exe 24->41         started        dnsIp10 89 C:\Users\user\AppData\Local\...\metina_4.tmp, PE32 26->89 dropped 43 metina_4.tmp 26->43         started        91 C:\Users\user\AppData\Local\...\install.dll, PE32 29->91 dropped 93 C:\Users\user\...\logi_audio_conexant.dll, PE32+ 29->93 dropped 95 C:\Users\...\legacy_forcefeedback_x86.dll, PE32 29->95 dropped 47 rundll32.exe 29->47         started        97 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 31->97 dropped 177 Multi AV Scanner detection for dropped file 31->177 179 Machine Learning detection for dropped file 31->179 181 Renames NTDLL to bypass HIPS 31->181 183 Checks if the current machine is a virtual machine (disk enumeration) 31->183 50 explorer.exe 31->50 injected 131 94.130.58.199 HETZNER-ASDE Germany 34->131 133 104.17.63.50 CLOUDFLARENETUS United States 34->133 185 Detected unpacking (changes PE section rights) 34->185 187 Tries to harvest and steal browser information (history, passwords, etc) 34->187 135 208.95.112.1 TUT-ASUS United States 37->135 137 88.99.66.31 HETZNER-ASDE Germany 37->137 141 3 other IPs or domains 37->141 189 Antivirus detection for dropped file 37->189 52 jfiag3g_gg.exe 37->52         started        54 jfiag3g_gg.exe 37->54         started        56 jfiag3g_gg.exe 37->56         started        99 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 39->99 dropped 58 jfiag3g_gg.exe 39->58         started        60 jfiag3g_gg.exe 39->60         started        62 jfiag3g_gg.exe 39->62         started        139 172.67.145.48 CLOUDFLARENETUS United States 41->139 101 C:\Users\user\AppData\Roaming\5907668.exe, PE32 41->101 dropped 103 C:\Users\user\AppData\Roaming\2521992.exe, PE32 41->103 dropped 105 C:\Users\user\AppData\Roaming\1222608.exe, PE32 41->105 dropped file11 signatures12 process13 dnsIp14 143 198.54.126.101 NAMECHEAP-NETUS United States 43->143 145 192.168.2.1 unknown unknown 43->145 115 C:\Users\user\AppData\Local\...\MBap2.exe, PE32 43->115 dropped 117 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 43->117 dropped 119 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 43->119 dropped 121 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 43->121 dropped 64 MBap2.exe 43->64         started        191 Writes to foreign memory regions 47->191 193 Allocates memory in foreign processes 47->193 195 Creates a thread in another existing process (thread injection) 47->195 69 svchost.exe 47->69         started        71 svchost.exe 47->71 injected 73 svchost.exe 47->73 injected 75 2 other processes 47->75 197 Tries to harvest and steal browser information (history, passwords, etc) 52->197 file15 signatures16 process17 dnsIp18 123 199.188.201.83 NAMECHEAP-NETUS United States 64->123 125 13.107.4.50 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 64->125 129 2 other IPs or domains 64->129 81 C:\Users\user\AppData\...\ZHizhywexonae.exe, PE32 64->81 dropped 83 C:\Users\user\AppData\...\Jociqaediwa.exe, PE32 64->83 dropped 85 C:\Program Files (x86)\...\SHororadaebae.exe, PE32 64->85 dropped 87 4 other files (3 malicious) 64->87 dropped 163 Antivirus detection for dropped file 64->163 165 Detected unpacking (overwrites its own PE header) 64->165 167 Machine Learning detection for dropped file 64->167 127 23.57.80.111 AKAMAI-ASUS United States 69->127 169 Sets debug register (to hijack the execution of another thread) 69->169 171 Modifies the context of a thread in another process (thread injection) 69->171 77 svchost.exe 69->77         started        file19 signatures20 process21 dnsIp22 147 198.13.62.186 AS-CHOOPAUS United States 77->147 173 Query firmware table information (likely to detect VMs) 77->173 signatures23
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-05-22 11:08:04 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:elysiumstealer family:plugx family:smokeloader family:vidar aspackv2 backdoor discovery evasion persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
Checks for common network interception software
ElysiumStealer
PlugX
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://khaleelahmed.com/upload/
http://twvickiassociation.com/upload/
http://www20833.com/upload/
http://cocinasintonterias.com/upload/
http://masaofukunaga.com/upload/
http://gnckids.com/upload/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_HyperPro03
Author:ditekSHen
Description:Hunt HyperPro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments