MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82e531dd4163ca5716a8b2f3feb188fc7fdbf8cac0270aa76664925fdd5124e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 10


Intelligence 10 IOCs 3 YARA 8 File information Comments

SHA256 hash: 82e531dd4163ca5716a8b2f3feb188fc7fdbf8cac0270aa76664925fdd5124e2
SHA3-384 hash: c459f19a3af58d2f4cd43be3316fd72c03988cdf1b698077fc30154ad7ee4502cb35ba9ee72919611e0286007f6f82c6
SHA1 hash: ca1d0832be94feac8d1441efcaa333886e8ce835
MD5 hash: 48ad5d8112df0d5b74f71fd25ccd4e18
humanhash: don-shade-tennis-maryland
File name:48AD5D8112DF0D5B74F71FD25CCD4E18.exe
Download: download sample
Signature DiamondFox
File size:4'060'687 bytes
First seen:2021-08-13 07:56:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcB7EwJ84vLRaBtIl9mVhKi/98J/94r0VwTsrZM3bDHIxbQSdXL5F6q7Q6i4cgKT:x1CvLUBsgcM4/94rGY3PHa3/rKgKg2T
Threatray 310 similar samples on MalwareBazaar
TLSH T165163314FBEAC0FBD82051329BCC6FAD46FC4B480B291AFB3751C31D6B6D525891E925
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
http://ggc-partners.info/decision.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://ggc-partners.info/decision.php https://threatfox.abuse.ch/ioc/184302/
185.53.46.25:18856 https://threatfox.abuse.ch/ioc/184311/
65.21.228.92:46802 https://threatfox.abuse.ch/ioc/184313/

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Sending a UDP request
Reading critical registry keys
Creating a file
Sending an HTTP POST request
Connection attempt to an infection source
Creating a file in the %AppData% directory
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a window
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Socelars Vidar Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus detection for dropped file
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates HTML files with .exe extension (expired dropper behavior)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 464743 Sample: M14EQVqU6H.exe Startdate: 13/08/2021 Architecture: WINDOWS Score: 100 73 34.97.69.225 GOOGLEUS United States 2->73 75 185.65.135.248 ESAB-ASSE Sweden 2->75 77 11 other IPs or domains 2->77 97 Antivirus detection for dropped file 2->97 99 Multi AV Scanner detection for dropped file 2->99 101 Multi AV Scanner detection for submitted file 2->101 103 9 other signatures 2->103 9 M14EQVqU6H.exe 8 2->9         started        12 svchost.exe 1 2->12         started        signatures3 process4 file5 39 C:\Users\user\AppData\...\setup_install.exe, PE32 9->39 dropped 41 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 9->41 dropped 43 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 9->43 dropped 45 3 other files (none is malicious) 9->45 dropped 14 setup_install.exe 10 9->14         started        process6 dnsIp7 93 172.67.170.195 CLOUDFLARENETUS United States 14->93 95 127.0.0.1 unknown unknown 14->95 65 C:\Users\user\...\cb3f07883441a5d6.exe, PE32 14->65 dropped 67 C:\Users\user\AppData\...\95714f41791.exe, PE32+ 14->67 dropped 69 C:\Users\user\AppData\...\81edfb0db828.exe, PE32 14->69 dropped 71 6 other files (4 malicious) 14->71 dropped 18 cmd.exe 1 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 4 other processes 14->24 file8 process9 process10 26 7da174d16d4.exe 4 54 18->26         started        31 95714f41791.exe 1 15 20->31         started        33 53d58f3832.exe 22->33         started        35 0b0f89497d35095.exe 24->35         started        37 27e380c23ad33.exe 15 8 24->37         started        dnsIp11 79 37.0.10.236 WKD-ASIE Netherlands 26->79 81 37.0.11.8 WKD-ASIE Netherlands 26->81 89 11 other IPs or domains 26->89 47 C:\Users\...\w4xprXURBPvvkkmyzgZ9Xn6p.exe, PE32 26->47 dropped 49 C:\Users\...\vtVfo7pVWVG8llXJ1gTb8m6U.exe, PE32 26->49 dropped 51 C:\Users\...\pTf9f8R4q4aS7_JmUbb_4x0W.exe, PE32 26->51 dropped 59 31 other files (29 malicious) 26->59 dropped 105 Drops PE files to the document folder of the user 26->105 107 Creates HTML files with .exe extension (expired dropper behavior) 26->107 109 Tries to harvest and steal browser information (history, passwords, etc) 26->109 111 Disable Windows Defender real time protection (registry) 26->111 83 208.95.112.1 TUT-ASUS United States 31->83 91 3 other IPs or domains 31->91 53 C:\Users\user\AppData\...\fastsystem.exe, PE32+ 31->53 dropped 55 C:\Users\user\AppData\...\aaa_011[1].dll, DOS 31->55 dropped 113 Contains functionality to steal Chrome passwords or cookies 31->113 115 Drops PE files to the startup folder 31->115 117 Machine Learning detection for dropped file 33->117 119 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 33->119 121 Checks if the current machine is a virtual machine (disk enumeration) 33->121 61 2 other files (none is malicious) 35->61 dropped 85 88.99.66.31 HETZNER-ASDE Germany 37->85 87 172.67.190.140 CLOUDFLARENETUS United States 37->87 57 C:\Users\user\AppData\Roaming\6443900.exe, PE32 37->57 dropped 63 3 other files (none is malicious) 37->63 dropped file12 signatures13
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-08-10 00:38:46 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:7new botnet:916 aspackv2 backdoor evasion infostealer persistence stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
autoit_exe
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
https://prophefliloc.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
sytareliar.xyz:80
yabelesatg.xyz:80
ceneimarck.xyz:80
https://lenak513.tumblr.com/
Unpacked files
SH256 hash:
76fd57122331c7e402c7ab4a48bb9a86529641200f391241e20f31232e5f439b
MD5 hash:
922068b48ff8abb7e513a724443c1f62
SHA1 hash:
fef5db5322dae45dade837d28a2ad1aa159c74b9
SH256 hash:
e51763543ade893e7423ed3f589fbe73f84ee2fb41f612cbfcbf61cf6e45d471
MD5 hash:
4352aeaf791c3bc2c18c3b00f53fd6e2
SHA1 hash:
3d3a3722e9b3811bf9b1fdf00a4f290a9396630a
SH256 hash:
0cfeb696a1e79a5933429e77f1d32b5d95fafbbd7053955a7ade9c0de264a904
MD5 hash:
2354ad9552eb7a2b129b6397be8fdcf1
SHA1 hash:
20218e9b1dc221230e279cdc1e33e012d38a7aeb
SH256 hash:
caffa930f6bfcf160d0bb219a9d54f2e5c3e7095f235c1e133055c0589655565
MD5 hash:
0712d795cf12496c20044b0203acf8f1
SHA1 hash:
e896b87b4a658f4d78033bed35e55cc7d610a7e6
SH256 hash:
1cdddf182f161ab789edfcc68a0706d0b8412a9ba67a3f918fe60fab270eabff
MD5 hash:
0965da18bfbf19bafb1c414882e19081
SHA1 hash:
e4556bac206f74d3a3d3f637e594507c30707240
SH256 hash:
c5483b2acbb352dc5c9a811d9616c4519f0e07c13905552be5ec869613ada775
MD5 hash:
13a289feeb15827860a55bbc5e5d498f
SHA1 hash:
e1f0a544fcc5b3bc0ab6a788343185ad1ad077ad
SH256 hash:
78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
MD5 hash:
c0d18a829910babf695b4fdaea21a047
SHA1 hash:
236a19746fe1a1063ebe077c8a0553566f92ef0f
SH256 hash:
8b8c567943a051de46cd33e0ac46da3619061c03575a495e43c769b147795663
MD5 hash:
21697d55c8b3300d4602b1906ce4b310
SHA1 hash:
1907abccc5d115a2f71b1c83799e7462a121a2ca
SH256 hash:
746b7fbdcee72ec1a5d776bc9af41a27610559abbf94f6f4b9f3ae43aeb83e6d
MD5 hash:
b053848b91f233e0b881fc852b59c8cb
SHA1 hash:
c54dd26a43178fc7eacaf95a52a3710e6a168e67
SH256 hash:
a5f373f8bcfae3d9f4895c477206de63f66f08e66b413114cf2666bed798eb71
MD5 hash:
7aaf005f77eea53dc227734db8d7090b
SHA1 hash:
b6be1dde4cf73bbf0d47c9e07734e96b3442ed59
SH256 hash:
c327d3ab19dd68a28b0e11624b08d5dd4beee62d16a75b189d28a57e408155f2
MD5 hash:
80525b3afe6b52414c12fa86fdaa4ead
SHA1 hash:
3b8fab9918cfe6ffff658b2738f66fd4dde7e6b2
SH256 hash:
18f519d18a4e57b05337b96482f99d24351c15ec097eb60f231a67a576b0dbd9
MD5 hash:
b1404f62d71ebafd2ad0ba17fcd94495
SHA1 hash:
ba4e1ee734721096f82603890d6df4f26602c182
SH256 hash:
82e531dd4163ca5716a8b2f3feb188fc7fdbf8cac0270aa76664925fdd5124e2
MD5 hash:
48ad5d8112df0d5b74f71fd25ccd4e18
SHA1 hash:
ca1d0832be94feac8d1441efcaa333886e8ce835
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments