MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 88c98c6871442d02b5f26dc7625926c1dcd4de88a7d31bc53786f6182204c902. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DiamondFox
Vendor detections: 13
| SHA256 hash: | 88c98c6871442d02b5f26dc7625926c1dcd4de88a7d31bc53786f6182204c902 |
|---|---|
| SHA3-384 hash: | 4c389e21f97885161acafbf5bd73d2450bf5c15048258a4541578215cd3347a2be3dc4cfd8043d2e80fbc148a7279f1e |
| SHA1 hash: | 1208f33ac7bd8d5bbe4089b75fe3b708bfc4bf03 |
| MD5 hash: | 00810b59644d1610f9eb57e2d9e175e4 |
| humanhash: | salami-delaware-white-potato |
| File name: | 00810B59644D1610F9EB57E2D9E175E4.exe |
| Download: | download sample |
| Signature | DiamondFox |
| File size: | 4'361'371 bytes |
| First seen: | 2021-07-18 14:10:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 98304:Ubhu1zNQzrgiH7hdjJXR85svk3upL/qkyZ9RVlWtH:UluzYF7hdjJXR85svkuLyjRVlS |
| Threatray | 124 similar samples on MalwareBazaar |
| TLSH | T1E516335239C494B3D5662A754E35AB11293CBD201F38CA6F93B8186EDA344D1FF32B93 |
| Reporter | |
| Tags: | DiamondFox exe |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://wymesc72.top/index.php | https://threatfox.abuse.ch/ioc/160942/ |
| http://morjed07.top/index.php | https://threatfox.abuse.ch/ioc/160943/ |
| http://x-vpn.ug/hfV3vDtt/index.php | https://threatfox.abuse.ch/ioc/160958/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
00810B59644D1610F9EB57E2D9E175E4.exe
Verdict:
Malicious activity
Analysis date:
2021-07-18 14:13:32 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CookieStealer
Detection(s):
Win.Malware.Generic-9866235-0
Win.Malware.Nymeria-9873414-0
Win.Malware.SmokeLoader-9874090-1
Win.Malware.Generic-9874384-0
Win.Malware.Qshell-9875653-0
Win.Malware.Chapak-9878126-0
Win.Malware.Chapak-9879189-0
Win.Malware.Nymeria-9879208-0
Win.Malware.Chapak-9879385-0
Win.Malware.Chapak-9879387-0
SecuriteInfo.com.Trojan.Rasftuby.Gen.14.10239.27368.UNOFFICIAL
Win.Malware.Nymeria-9873414-0
Win.Malware.SmokeLoader-9874090-1
Win.Malware.Generic-9874384-0
Win.Malware.Qshell-9875653-0
Win.Malware.Chapak-9878126-0
Win.Malware.Chapak-9879189-0
Win.Malware.Nymeria-9879208-0
Win.Malware.Chapak-9879385-0
Win.Malware.Chapak-9879387-0
SecuriteInfo.com.Trojan.Rasftuby.Gen.14.10239.27368.UNOFFICIAL
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Chapak
Verdict:
Malicious
Result
Threat name:
Backstage Stealer Cookie Stealer RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Backstage Stealer
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Behaviour
Behavior Graph:
Detection:
raccoon
Threat name:
Win32.Trojan.Chapak
Status:
Malicious
First seen:
2021-07-12 20:06:03 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
masslogger
Similar samples:
+ 114 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:cryptbot family:glupteba family:metasploit family:redline family:smokeloader family:socelars family:vidar botnet:15_7_r botnet:865 botnet:903 agilenet backdoor discovery dropper evasion infostealer loader persistence spyware stealer themida trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
autoit_exe
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Nirsoft
Vidar Stealer
CryptBot
CryptBot Payload
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
wymesc72.top
morjed07.top
xtarweanda.xyz:80
https://sslamlssa1.tumblr.com/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
wymesc72.top
morjed07.top
xtarweanda.xyz:80
https://sslamlssa1.tumblr.com/
Unpacked files
SH256 hash:
df7137b05ea3a31c9f95d8fb6da48693da61cf3bba9aaef04c2d5e72bf63bd9c
MD5 hash:
4b7082c2226e6a3ab4a7f36a487ce3ab
SHA1 hash:
16f0a0e4db0522d7559f07fa1b92e312ab2edf84
SH256 hash:
304e420204d773b118d8062374597577f90d4cf1086814638587bec9cfbeeff5
MD5 hash:
b6799ef54cf66f2b1239f5b7e799c4b1
SHA1 hash:
1c80500d0b79b89f4cde7c8e236721e6f1de7c18
SH256 hash:
d0dff6cfb8b523ec2d1bbedb11bf47aec7ab6a17a3d00bc0a921c7787ae66f5b
MD5 hash:
f007792a9558a2ce1375b4ec4993a36c
SHA1 hash:
108dcb7c17cc5a41924fc39e3c09057cade1ace2
SH256 hash:
e98199099130da0e62f2c6b9f989dd8e3076fdb55162f4a12540eea55e8e890f
MD5 hash:
c70c527554c5dd0acf0c13ee6edff8aa
SHA1 hash:
58c23239da9af51827b30aa41c600b14954bbf15
SH256 hash:
67cdc7c5de5e46229adc831dc6fd3053d996ecf02e94706b6b6ae1b0ed976f2c
MD5 hash:
555b5b60b2dcc53e71e6d9ba8302c4b9
SHA1 hash:
550326b1226629a867d4606ad0c98c4ef9596b47
SH256 hash:
21a27c1c007206117edc2618bb834fa31d07f0aa0fe15ef0171e90ec70733017
MD5 hash:
71a8b425237ed53182cebb5dbc841332
SHA1 hash:
4220c9de6b28f499a8e37818e3a1118ca49ed509
SH256 hash:
e7ea471d02218191b90911b15cc9991eab28a1047a914c784966ecd182bd499c
MD5 hash:
7f7c75db900d8b8cd21c7a93721a6142
SHA1 hash:
c8b86e62a8479a4e6b958d2917c60dccef8c033f
SH256 hash:
e1f78561b92e392c01f2dc14021fab196b43dab8d68c052c3256487e3c7c3b0d
MD5 hash:
dddaf4d52b6ccd14e48d55df21771843
SHA1 hash:
6732d81a72a83f59df0899449ad3053ffecc2738
SH256 hash:
55cdb9054f66ed88b8215d9f981efd7421c6f50dc9285140ec5ff591e34121bd
MD5 hash:
5631522a0758055c133e7966c1948802
SHA1 hash:
90caf8180bf43727fc490ffa34b1d578833aad7f
SH256 hash:
c0db7b3683836e025148140a0efdcd92ea7a58e3c6a40b2e27475d1e2f028b2e
MD5 hash:
4a85709f21f295e89b4ba936e9457e4b
SHA1 hash:
a4c64a7369bc2cca1fa39e86c1fa51e35455485a
SH256 hash:
c612a69033bcf47117ab6202a9f4313a6badc2f9be625e08f39f79e99109b6e4
MD5 hash:
ded88fd3c262855314b70b00c2d74c0c
SHA1 hash:
da072027d456f7a186351fa79cdd472df2bee72a
SH256 hash:
3211a67156069a1eb9cbcc0a8758073bcb9c154298a74645fe08a0b1144d748e
MD5 hash:
f277a1686035938fe0709c2140698c73
SHA1 hash:
4de0ff83d23a4ade95eca53b8c02386d96e1344e
SH256 hash:
5d9a147b48ef767a2ad8d96c444320a49f02187cc082461a87e49f9daafee572
MD5 hash:
71c6f293c127ee7bdf408909603d02f0
SHA1 hash:
6daeb6ef5c72ce6c8f1ebb8a1017306189f83f65
Detections:
win_socelars_auto
SH256 hash:
88c98c6871442d02b5f26dc7625926c1dcd4de88a7d31bc53786f6182204c902
MD5 hash:
00810b59644d1610f9eb57e2d9e175e4
SHA1 hash:
1208f33ac7bd8d5bbe4089b75fe3b708bfc4bf03
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Redline
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.