MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9093d320baf890134c0fc716eaa10cf5027dd4e804570867506537b555fd5ea7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



StealthWorker


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: 9093d320baf890134c0fc716eaa10cf5027dd4e804570867506537b555fd5ea7
SHA3-384 hash: 0e27fd74f96c57a9636eb8f20588b6de148be16d8ea6b10f4ecfd73999790af166575047b936b84df5287d38190ea5b6
SHA1 hash: 8329a08acea7666e06e75af8e3d88c36e777f17e
MD5 hash: 1d153b36dff89349d52e0b5847b9a8a4
humanhash: delaware-cardinal-magazine-undress
File name:1d153b36dff89349d52e0b5847b9a8a4.exe
Download: download sample
Signature StealthWorker
File size:153'600 bytes
First seen:2021-08-24 10:26:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 02fed18d5788c3d9bcc1897631bb2a01 (8 x RaccoonStealer, 2 x DanaBot, 2 x RedLineStealer)
ssdeep 3072:km7BEuvfr02yZzFRPpYC585IXiCwBwJQKt:DESfrZy9yit
Threatray 3'632 similar samples on MalwareBazaar
TLSH T177E3BE1176D0C072D445813C48E7CA90E62EFD61EFB1D94B3BD8266E1F712D0BB2A2A7
dhash icon 1072c093b0381906 (22 x RedLineStealer, 22 x RaccoonStealer, 20 x Stop)
Reporter abuse_ch
Tags:exe StealthWorker


Avatar
abuse_ch
StealthWorker C2:
http://188.119.112.104/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://188.119.112.104/ https://threatfox.abuse.ch/ioc/193472/

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1d153b36dff89349d52e0b5847b9a8a4.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-24 10:28:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Creating a process from a recently created file
Sending an HTTP POST request
Launching a process
Searching for the window
Reading critical registry keys
Setting browser functions hooks
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Deleting of the original file
Enabling autorun by creating a file
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Tofsee Vidar Xmrig
Detection:
malicious
Classification:
spre.troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates files in alternative data streams (ADS)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Send many emails (e-Mail Spam)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Yara detected Vidar
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 470571 Sample: zXvieSHD5r.exe Startdate: 24/08/2021 Architecture: WINDOWS Score: 100 101 z-p42-instagram.c10r.instagram.com 2->101 103 z-p42-instagram.c10r.facebook.com 2->103 105 57 other IPs or domains 2->105 139 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->139 141 Malicious sample detected (through community Yara rule) 2->141 143 Antivirus detection for URL or domain 2->143 145 20 other signatures 2->145 11 zXvieSHD5r.exe 2->11         started        14 mvlzaodj.exe 2->14         started        16 hetifah 2->16         started        18 4 other processes 2->18 signatures3 process4 dnsIp5 187 Detected unpacking (changes PE section rights) 11->187 189 Contains functionality to inject code into remote processes 11->189 191 Injects a PE file into a foreign processes 11->191 21 zXvieSHD5r.exe 11->21         started        193 Writes to foreign memory regions 14->193 195 Allocates memory in foreign processes 14->195 24 svchost.exe 14->24         started        197 Machine Learning detection for dropped file 16->197 28 hetifah 16->28         started        107 192.168.2.1 unknown unknown 18->107 signatures6 process7 dnsIp8 173 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->173 175 Maps a DLL or memory area into another process 21->175 177 Checks if the current machine is a virtual machine (disk enumeration) 21->177 30 explorer.exe 13 21->30 injected 109 trends.google.com 24->109 111 nifty.com 24->111 113 63 other IPs or domains 24->113 89 C:\Windows\SysWOW64\...\systemprofile:.repos, data 24->89 dropped 179 System process connects to network (likely due to code injection or exploit) 24->179 181 Creates files in alternative data streams (ADS) 24->181 183 Injects a PE file into a foreign processes 24->183 185 Creates a thread in another existing process (thread injection) 28->185 file9 signatures10 process11 dnsIp12 125 185.49.70.90, 2080, 49745 LEASEWEB-DE-FRA-10DE United Kingdom 30->125 127 readinglistforaugust2.xyz 95.213.224.6, 80 SELECTELRU Russian Federation 30->127 129 2 other IPs or domains 30->129 93 C:\Users\user\AppData\Roaming\hetifah, PE32 30->93 dropped 95 C:\Users\user\AppData\Local\Temp\794E.exe, PE32 30->95 dropped 97 C:\Users\user\AppData\Local\Temp\6FE6.exe, PE32 30->97 dropped 99 4 other files (2 malicious) 30->99 dropped 131 System process connects to network (likely due to code injection or exploit) 30->131 133 Benign windows process drops PE files 30->133 135 Performs DNS queries to domains with low reputation 30->135 137 4 other signatures 30->137 35 794E.exe 30->35         started        39 6FE6.exe 30->39         started        41 65C4.exe 86 30->41         started        44 11 other processes 30->44 file13 signatures14 process15 dnsIp16 77 C:\Users\user\AppData\Local\...\mvlzaodj.exe, PE32 35->77 dropped 147 Detected unpacking (changes PE section rights) 35->147 149 Machine Learning detection for dropped file 35->149 151 Uses netsh to modify the Windows network and firewall settings 35->151 153 Modifies the windows firewall 35->153 46 cmd.exe 35->46         started        49 cmd.exe 35->49         started        51 sc.exe 35->51         started        57 3 other processes 35->57 155 Query firmware table information (likely to detect VMs) 39->155 157 Tries to detect sandboxes and other dynamic analysis tools (window names) 39->157 169 2 other signatures 39->169 53 conhost.exe 39->53         started        115 188.34.200.103, 49747, 80 HETZNER-ASDE Germany 41->115 117 eduarroma.tumblr.com 74.114.154.18, 443, 49746 AUTOMATTICUS Canada 41->117 79 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 41->79 dropped 81 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 41->81 dropped 83 C:\Users\user\AppData\...\mozglue[1].dll, PE32 41->83 dropped 87 9 other files (none is malicious) 41->87 dropped 159 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 41->159 171 2 other signatures 41->171 55 cmd.exe 41->55         started        119 185.230.143.48, 14462, 49744 HostingvpsvilleruRU Russian Federation 44->119 121 swretjhwrtj.gq 104.21.86.82, 49743, 80 CLOUDFLARENETUS United States 44->121 123 2 other IPs or domains 44->123 85 C:\Users\user\AppData\Local\Temp\...\.dll, PE32+ 44->85 dropped 161 System process connects to network (likely due to code injection or exploit) 44->161 163 Tries to steal Mail credentials (via file access) 44->163 165 Performs DNS queries to domains with low reputation 44->165 167 Tries to detect virtualization through RDTSC time measurements 44->167 file17 signatures18 process19 file20 91 C:\Windows\SysWOW64\...\mvlzaodj.exe (copy), PE32 46->91 dropped 59 conhost.exe 46->59         started        61 conhost.exe 49->61         started        63 conhost.exe 51->63         started        65 conhost.exe 55->65         started        67 taskkill.exe 55->67         started        69 timeout.exe 55->69         started        71 conhost.exe 57->71         started        73 conhost.exe 57->73         started        75 conhost.exe 57->75         started        process21
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2021-08-24 04:51:32 UTC
AV detection:
19 of 27 (70.37%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:tofsee family:vidar family:xmrig botnet:824 botnet:@rarenut0 botnet:fe582536ec580228180f270f7cb80a867860e010 backdoor discovery evasion infostealer miner persistence spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
XMRig Miner Payload
Raccoon
RedLine
RedLine Payload
SmokeLoader
Tofsee
Vidar
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
https://eduarroma.tumblr.com/
185.230.143.48:14462
Unpacked files
SH256 hash:
0a9a7acf77fe4f890fe2acf761fa7f369418bb1f733504acd0792f589ccc7b15
MD5 hash:
ad94a86355be2ad9348b88e8972e8320
SHA1 hash:
8c7ff71739a5194efc5c7bee9c37ad92a9e72646
SH256 hash:
9093d320baf890134c0fc716eaa10cf5027dd4e804570867506537b555fd5ea7
MD5 hash:
1d153b36dff89349d52e0b5847b9a8a4
SHA1 hash:
8329a08acea7666e06e75af8e3d88c36e777f17e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

StealthWorker

Executable exe 9093d320baf890134c0fc716eaa10cf5027dd4e804570867506537b555fd5ea7

(this sample)

  
Delivery method
Distributed via web download

Comments