MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TeamBot


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43
SHA3-384 hash: d2a8e37f5f0770c82935d5ec1b6414f8984ffaa874b7324fed74f06819cbdb08b8501414babf9e3309105e01a78d3e82
SHA1 hash: 7fecc9ee90387b518daba532fdb2c5d9e142d633
MD5 hash: 060acab8db9cdc028b321bce548bc126
humanhash: two-cold-fanta-bravo
File name:060acab8db9cdc028b321bce548bc126
Download: download sample
Signature TeamBot
File size:325'120 bytes
First seen:2022-01-29 13:13:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 25d75a2460d349e1f584497960b4d220 (1 x Smoke Loader, 1 x RaccoonStealer, 1 x TeamBot)
ssdeep 6144:6EctpAqsohNYFaUu8J7ITsqYigavwVfG:6EcsQhNYAi7u7
Threatray 4'019 similar samples on MalwareBazaar
TLSH T17364BDD07290FC75C4413E708876CBA25B3BA832DA649507F734A76E1E733E0B66635A
File icon (PE):PE icon
dhash icon fcfcb4b4b494d9c1 (74 x Amadey, 56 x Smoke Loader, 38 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe TeamBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
261
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
060acab8db9cdc028b321bce548bc126
Verdict:
No threats detected
Analysis date:
2022-01-29 13:17:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
DNS request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
SystemUptime
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
exploit greyware lockbit qbot raccoon smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Djvu SmokeLoader
Detection:
malicious
Classification:
rans.troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Djvu Ransomware
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 562605 Sample: N2UHGxYj1P Startdate: 29/01/2022 Architecture: WINDOWS Score: 100 55 tzgl.org 211.168.197.211, 49802, 80 LGDACOMLGDACOMCorporationKR Korea Republic of 2->55 57 192.168.2.1 unknown unknown 2->57 59 2 other IPs or domains 2->59 65 Malicious sample detected (through community Yara rule) 2->65 67 Antivirus detection for URL or domain 2->67 69 Antivirus detection for dropped file 2->69 71 7 other signatures 2->71 10 N2UHGxYj1P.exe 2->10         started        13 vufhetu 2->13         started        15 D55F.exe 2->15         started        signatures3 process4 signatures5 87 Detected unpacking (changes PE section rights) 10->87 89 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->89 91 Maps a DLL or memory area into another process 10->91 17 explorer.exe 7 10->17 injected 93 Machine Learning detection for dropped file 13->93 95 Checks if the current machine is a virtual machine (disk enumeration) 13->95 97 Creates a thread in another existing process (thread injection) 13->97 99 Injects a PE file into a foreign processes 15->99 process6 dnsIp7 49 amogohuigotuli.at 17->49 51 189.225.195.118, 49785, 49794, 49796 UninetSAdeCVMX Mexico 17->51 53 6 other IPs or domains 17->53 37 C:\Users\user\AppData\Roaming\vufhetu, PE32 17->37 dropped 39 C:\Users\user\AppData\Local\Temp\D55F.exe, PE32 17->39 dropped 41 C:\Users\user\AppData\Local\Temp\2859.exe, PE32 17->41 dropped 43 C:\Users\user\...\vufhetu:Zone.Identifier, ASCII 17->43 dropped 73 System process connects to network (likely due to code injection or exploit) 17->73 75 Benign windows process drops PE files 17->75 77 Injects code into the Windows Explorer (explorer.exe) 17->77 79 3 other signatures 17->79 22 D55F.exe 17->22         started        25 2859.exe 8 17->25         started        file8 signatures9 process10 file11 81 Machine Learning detection for dropped file 22->81 83 Injects a PE file into a foreign processes 22->83 28 D55F.exe 1 16 22->28         started        45 C:\Users\user\AppData\Local\Temp\2I4I1u.9~J, PE32 25->45 dropped 85 Multi AV Scanner detection for dropped file 25->85 signatures12 process13 dnsIp14 61 api.2ip.ua 77.123.139.190, 443, 49793, 49795 VOLIA-ASUA Ukraine 28->61 47 C:\Users\user\AppData\Local\...\D55F.exe, PE32 28->47 dropped 32 D55F.exe 28->32         started        35 icacls.exe 28->35         started        file15 process16 signatures17 63 Injects a PE file into a foreign processes 32->63
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-01-26 04:02:18 UTC
File Type:
PE (Exe)
Extracted files:
61
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor collection trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Accesses Microsoft Outlook profiles
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Unpacked files
SH256 hash:
f12298a85ad18a55421deada8eb23f2a519a606439eedc2f9a60cd1ec8494914
MD5 hash:
b759df8ed45d16518bd54eb6f3b996ca
SHA1 hash:
ed63cdc2a64db6902b2a94e94020ff7db52c7691
SH256 hash:
80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43
MD5 hash:
060acab8db9cdc028b321bce548bc126
SHA1 hash:
7fecc9ee90387b518daba532fdb2c5d9e142d633
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TeamBot

Executable exe 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-29 13:13:39 UTC

url : hxxp://coin-coin-file-9.com/files/6114_1643113394_8878.exe