MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7eed06168ef0ddb3a6d968549840a906b25d633598cf37418dabba077c778273. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TeamBot


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 7eed06168ef0ddb3a6d968549840a906b25d633598cf37418dabba077c778273
SHA3-384 hash: af910c391980c5745a85e895dab75e5c62089a9e77bb08799e18bf1c2fe4a4c3c328b12bf5c2b06c91414a21d9adfed5
SHA1 hash: 74405d9a2bf6163c69084566962eb170c3d348c9
MD5 hash: d937bf5e62381717877134f8c3961421
humanhash: moon-don-neptune-idaho
File name:6523.exe
Download: download sample
Signature TeamBot
File size:237'568 bytes
First seen:2023-05-13 22:44:21 UTC
Last seen:2023-05-19 09:45:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 32b5e204cb5d162da155afdde477c5a9 (1 x TeamBot, 1 x RedLineStealer, 1 x CoinMiner)
ssdeep 3072:1eqGEm9TivH0szvdrmZ6SUOtcT18/1MzL8Ww/dC4+CVb43W6AV2v4Oh6RB:sVfTuH0IvdrmZxU9a6ZCx3B
Threatray 89 similar samples on MalwareBazaar
TLSH T104349D1273D1AC74E32296308E6AC6E46B5FF8644F177AEB3754EA2F09712E2C572341
TrID 39.5% (.EXE) InstallShield setup (43053/19/16)
28.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
9.6% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 00204020b2632100 (1 x TeamBot)
Reporter JaffaCakes118
Tags:TeamBot

Intelligence


File Origin
# of uploads :
2
# of downloads :
61
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Install.exe
Verdict:
Malicious activity
Analysis date:
2023-05-03 09:46:01 UTC
Tags:
evasion opendir privateloader loader rat redline smoke trojan amadey tofsee miner glupteba

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Query of malicious DNS domain
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware lockbit packed tofsee yakes zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Amadey, Djvu, Fabookie, SmokeLoader
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Djvu Ransomware
Yara detected Fabookie
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 865618 Sample: 6523.exe Startdate: 14/05/2023 Architecture: WINDOWS Score: 100 87 api.2ip.ua 2->87 111 Found malware configuration 2->111 113 Malicious sample detected (through community Yara rule) 2->113 115 Antivirus detection for URL or domain 2->115 117 12 other signatures 2->117 12 6523.exe 2->12         started        15 irhgbjf 2->15         started        17 27FB.exe 2->17         started        19 2 other processes 2->19 signatures3 process4 signatures5 143 Detected unpacking (changes PE section rights) 12->143 145 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->145 147 Maps a DLL or memory area into another process 12->147 21 explorer.exe 10 35 12->21 injected 149 Checks if the current machine is a virtual machine (disk enumeration) 15->149 151 Creates a thread in another existing process (thread injection) 15->151 153 Multi AV Scanner detection for dropped file 17->153 155 Machine Learning detection for dropped file 17->155 157 Sample uses process hollowing technique 17->157 159 Injects a PE file into a foreign processes 17->159 26 WerFault.exe 10 19->26         started        process6 dnsIp7 89 175.120.254.9 SKB-ASSKBroadbandCoLtdKR Korea Republic of 21->89 91 175.126.109.15 SKB-ASSKBroadbandCoLtdKR Korea Republic of 21->91 93 9 other IPs or domains 21->93 67 C:\Users\user\AppData\Roaming\irhgbjf, PE32 21->67 dropped 69 C:\Users\user\AppData\Roaming\fvhgbjf, PE32 21->69 dropped 71 C:\Users\user\AppData\Local\TempDF4.exe, PE32 21->71 dropped 73 12 other malicious files 21->73 dropped 119 System process connects to network (likely due to code injection or exploit) 21->119 121 Benign windows process drops PE files 21->121 123 Deletes itself after installation 21->123 125 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->125 28 2D10.exe 5 21->28         started        32 EDF4.exe 21->32         started        34 B3AD.exe 21->34         started        36 8 other processes 21->36 file8 signatures9 process10 file11 81 C:\Users\user\AppData\Local\Temp\ss31.exe, PE32+ 28->81 dropped 83 C:\Users\user\AppData\Local\...\oldplayer.exe, PE32 28->83 dropped 85 C:\Users\user\AppData\Local\...\XandETC.exe, PE32+ 28->85 dropped 161 Antivirus detection for dropped file 28->161 163 Multi AV Scanner detection for dropped file 28->163 165 Machine Learning detection for dropped file 28->165 38 oldplayer.exe 28->38         started        42 ss31.exe 13 28->42         started        45 XandETC.exe 28->45         started        167 Detected unpacking (changes PE section rights) 32->167 169 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 32->169 171 Maps a DLL or memory area into another process 32->171 173 Checks if the current machine is a virtual machine (disk enumeration) 34->173 175 Creates a thread in another existing process (thread injection) 34->175 177 Detected unpacking (overwrites its own PE header) 36->177 179 Injects a PE file into a foreign processes 36->179 47 27FB.exe 36->47         started        49 1412.exe 36->49         started        51 151.exe 36->51         started        53 5 other processes 36->53 signatures12 process13 dnsIp14 75 C:\Users\user\AppData\Local\...\oneetx.exe, PE32 38->75 dropped 127 Antivirus detection for dropped file 38->127 129 Multi AV Scanner detection for dropped file 38->129 131 Machine Learning detection for dropped file 38->131 55 oneetx.exe 38->55         started        101 jp.imgjeoighw.com 103.100.211.218, 49701, 80 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 42->101 103 ss.apjeoighw.com 154.221.31.191 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 42->103 109 6 other IPs or domains 42->109 133 Tries to harvest and steal browser information (history, passwords, etc) 42->133 77 C:\Users\user\AppData\Local\...\27FB.exe, PE32 47->77 dropped 59 icacls.exe 47->59         started        105 api.2ip.ua 162.0.217.254, 443, 49702 ACPCA Canada 49->105 79 C:\Users\user\AppData\Local\...\1412.exe, PE32 49->79 dropped 61 icacls.exe 49->61         started        107 192.168.2.1 unknown unknown 53->107 file15 signatures16 process17 dnsIp18 95 77.73.134.27 FIBEROPTIXDE Kazakhstan 55->95 97 www.facebook.com 55->97 99 star-mini.c10r.facebook.com 55->99 135 Antivirus detection for dropped file 55->135 137 Multi AV Scanner detection for dropped file 55->137 139 Creates an undocumented autostart registry key 55->139 141 2 other signatures 55->141 63 schtasks.exe 55->63         started        signatures19 process20 process21 65 conhost.exe 63->65         started       
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-05-03 12:56:10 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
31 of 37 (83.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:djvu family:smokeloader family:vidar botnet:e5d7cb6205191dc1a4f6288000860943 botnet:pub1 backdoor discovery evasion ransomware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Looks up external IP address via web service
Executes dropped EXE
Modifies file permissions
Downloads MZ/PE file
Stops running service(s)
Amadey
Detected Djvu ransomware
Djvu Ransomware
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://toobussy.com/tmp/
http://wuc11.com/tmp/
http://ladogatur.ru/tmp/
http://kingpirate.ru/tmp/
http://zexeq.com/lancer/get.php
77.73.134.27/n9kdjc3xSf/index.php
https://steamcommunity.com/profiles/76561198272578552
https://t.me/libpcre
Gathering data
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments