MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8fe6c86b038ce91a991fe6eb8a9b323bb37b554ff6b4e5c18de3fe52d4aedf6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Adware.FileTour
Vendor detections: 10
| SHA256 hash: | 8fe6c86b038ce91a991fe6eb8a9b323bb37b554ff6b4e5c18de3fe52d4aedf6d |
|---|---|
| SHA3-384 hash: | 27f9f2912d27242ceb79561f726470f3ef103d5a71888d3e7d7a9aa0ead96cd27275f59acb9ae83a1aa96e42fe59c116 |
| SHA1 hash: | 265311e2afd9f59e824f4b77162cf3dfa278eb7e |
| MD5 hash: | 6d18c8e8ab9051f7a70b89ff7bb0ec35 |
| humanhash: | queen-moon-purple-artist |
| File name: | setup_x86_x64_install.exe |
| Download: | download sample |
| Signature | Adware.FileTour |
| File size: | 4'534'901 bytes |
| First seen: | 2021-09-09 21:59:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 98304:yRWYQccy8xqv6ivCd0JHEczLiRugNgLWO:ynrCqv6iH+cXXgNg6O |
| Threatray | 535 similar samples on MalwareBazaar |
| TLSH | T15126332557BCC796E3D633B71C2B828D8F597A0152960307ACA0B93EC961471DCDCFAA |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | Adware.FileTour exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-09-09 21:53:36 UTC
Tags:
trojan evasion rat redline loader stealer vidar unwanted netsupport
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Sending a UDP request
Creating a window
Reading critical registry keys
Moving a recently created file
Creating a process with a hidden window
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Launching the default Windows debugger (dwwin.exe)
Delayed reading of the file
Creating a file in the Program Files subdirectories
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file in the Windows subdirectories
Sending an HTTP POST request
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a single autorun event
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Detected unpacking (changes PE section rights)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Downloader.Zenlod
Status:
Malicious
First seen:
2021-09-09 22:00:10 UTC
AV detection:
29 of 45 (64.44%)
Threat level:
3/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 525 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pab123 aspackv2 backdoor infostealer stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
Malware Config
C2 Extraction:
https://gheorghip.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.14.49.169:22411
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.14.49.169:22411
Unpacked files
SH256 hash:
0fd897b1e74f50e47526f974bf4906ecbe4a331b1ae4e2ec309fbee57a032586
MD5 hash:
4c3423a6e5e3337c71c551358f1334c1
SHA1 hash:
e3f59c4781ab6b19adb9eb85054a060b34c3df73
SH256 hash:
be466c036bbcec6936d2b2f51d530c89b592c6624fb839914d98ee9c935671b7
MD5 hash:
86bfea0cf31c782163dce5387419a19b
SHA1 hash:
d24a2e9fd57014cc5bb0b4089012847807dd6016
SH256 hash:
c02d2c9ae0b587f9b7631c443ce5a7d6d409c0a5d09ff6b389ca1330d44a1149
MD5 hash:
a91a81780273bb279790c1fbb6fb3105
SHA1 hash:
4bedae163300009aac8afa2c2b42ea6c184ca9dd
SH256 hash:
ec32b38e5ad5c285c1d6d8237341a99772709e8e4ea23db953d63ab8f078379c
MD5 hash:
ccf4a60623b784b084855d0468d76eab
SHA1 hash:
9419cc65a1bb70e8780f6da7cedd169eb333db88
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
c034ee0ed45c8278cf10e330a92220f7d33c2d3d10f2721c2acabcca552b6423
MD5 hash:
4df600c45dbfd49fa9e31134e8f47434
SHA1 hash:
f07d4411a7b3722206e9d17e94749819930cedcb
SH256 hash:
cf9be5a04001fd464a9cd8c47dcf16edd9523846dd90b76aa361d48901a6dd07
MD5 hash:
78a80556b64f85f6d215e12b7c6f051c
SHA1 hash:
b76e4be025c4a06453916d1514a1e84328451ed1
SH256 hash:
4974a5caec0e8009ce8fc3e0646007f60eeb7f191d32d3c1c78eb3bb2927a246
MD5 hash:
421ea0195d3e7031c68847f3a10faa9c
SHA1 hash:
97f5b47f950beac9cc2275e6fbd7015745b36a7b
SH256 hash:
462903116807da9a27462013c045a75d7f331a245fd99d4d46d06fc4f28a22af
MD5 hash:
0a241fa5ab68617d9d736287443a726b
SHA1 hash:
68b034724879270d92c7393cff6a18d4700d53d8
SH256 hash:
f9f37bf5cd2308425ebb111a260118574b4ace5ae866a7440ac00b29ffa453a8
MD5 hash:
9ff20b6ea8e49447a1435441671d68a6
SHA1 hash:
18b23a404fffe1dab8c1ef36adaebf1c6aee9202
SH256 hash:
17c6394f4256e6ec014b98d078dcfae89bfff431bb5fd17e95d5858b50ca1659
MD5 hash:
2927aaa5f942c2fb3f781d0ed30fb6ab
SHA1 hash:
19c566defbc40d60e909cd4635a840a042b119b3
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
bc4bacc3b8b28d898f1671b79f216cca439f95eb60cd32d3e3ecafbecac42780
MD5 hash:
047bca47d9d12191811fb2e87cded3aa
SHA1 hash:
afdc5d27fb919d1d813e6a07466f889dbc8c6677
SH256 hash:
5f463952815ce4f763e9f4b3b72ed70ad82f74a69a271fc2b1588055c3fec4cc
MD5 hash:
21775ff041e7277d87aa8fdf1e09da6c
SHA1 hash:
6dd1d6716cb93adef6c9b39490a79e77fd5396c9
SH256 hash:
75837fb002c28ae5e4f3d77bcf29d38c847b385af1f10847872cc4585480e76a
MD5 hash:
066432b957c64a1a8a6a883b241b9e7b
SHA1 hash:
fbbf86ae9e33f483491f79ec0a065b066484d22f
SH256 hash:
b01e4a4283ac9e14ddc13bd90c7289a094b0c5d1f9e325e1c3bbb53c38df67f3
MD5 hash:
a070891e0fa22a6b18b29129d922b0ee
SHA1 hash:
b941d7541ccb47b9feb95201d37a5be48598a0d4
SH256 hash:
e94c6e593ed9ba221ba464489c4d2f708de644ff0522dbce854a2062a6156693
MD5 hash:
3e86207c64605d0da94c2096c527d526
SHA1 hash:
647e0fdd0de2e4dc209bdb2d709b25e0f380afec
SH256 hash:
38046382500f1739883d2c53639ffbc5756843da7574fe3e6820724f522958e2
MD5 hash:
33600475b2cc5445df2d3809c3798311
SHA1 hash:
3cb60432de30b82e87b8b607e0180a7843128b5a
Parent samples :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 hash:
9dcfdf58d331dca3406f4bc4185f79d5f9318db1a5d70781ebbcca5d114824a0
MD5 hash:
34c22c8622b1e49c50be3c97fcd1144d
SHA1 hash:
638a661de239b8837e5eb21622a7d966d39d3c28
Detections:
win_socelars_auto
SH256 hash:
3affe6557a29eaab28e2703cdac741df28be4d2fcbac5a5ab5a4e6b83d22bda1
MD5 hash:
4d4dd27cc0511c0168dcd494f2b19f83
SHA1 hash:
d6af59b945cd308cd5b2380bfa3136bc26a3a8a8
SH256 hash:
c167d95d6fbd411192889bab02a007eabfcda869c136e3c6f38e43fee6768803
MD5 hash:
8c07bc6c815ab2263720aa630eddfb1c
SHA1 hash:
67af51f942ce17642c2df62b010e4faae70ed540
SH256 hash:
3dc52cc017760afa49ff80f6405505bc6a97fecc388d16823851b8328c6ea90c
MD5 hash:
949b8a7f9e489c33e04c35273809a742
SHA1 hash:
bc7a5fdc7daae2b97e22b3454d5409979d007f7c
SH256 hash:
8fe6c86b038ce91a991fe6eb8a9b323bb37b554ff6b4e5c18de3fe52d4aedf6d
MD5 hash:
6d18c8e8ab9051f7a70b89ff7bb0ec35
SHA1 hash:
265311e2afd9f59e824f4b77162cf3dfa278eb7e
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.