MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9453ddc4bebb87a937e3d53d38c56814907b2862496142ccdb568f48caf2d467. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 9453ddc4bebb87a937e3d53d38c56814907b2862496142ccdb568f48caf2d467
SHA3-384 hash: ca5763eca01ad797dee0730c33a11509ad729c56e58e1f7ab9fb5985d77a037d7e7a80b8e25a0995a05ee74573694331
SHA1 hash: e61ecab00d442eced5be53a52f4ee04df54747f8
MD5 hash: eb6db30e23d77e2740d98a5c23fe0920
humanhash: william-rugby-april-september
File name:EB6DB30E23D77E2740D98A5C23FE0920.exe
Download: download sample
Signature Adware.FileTour
File size:4'971'455 bytes
First seen:2021-09-02 17:46:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:x5CvLUBsgMTSv4Rk02/43SBeiKQLDUep6lOtIO0lErExB:xyLUCg5v8TQLoe4lJlAa
Threatray 321 similar samples on MalwareBazaar
TLSH T16036330166D640FBDD2164376B5CE7FE68B89B8045201EDBE3A4A7860B75C8F122FE1D
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
http://5.181.156.221/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.221/ https://threatfox.abuse.ch/ioc/213378/

Intelligence


File Origin
# of uploads :
1
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
EB6DB30E23D77E2740D98A5C23FE0920.exe
Verdict:
No threats detected
Analysis date:
2021-09-02 17:46:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Deleting a recently created file
Creating a window
Creating a process with a hidden window
Launching cmd.exe command interpreter
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Delayed reading of the file
Creating a file in the Program Files subdirectories
Possible injection to a system process
Unauthorized injection to a recently created process
Query of malicious DNS domain
Connection attempt to an infection source
Sending a TCP request to an infection source
Blocking the Windows Defender launch
Sending an HTTP GET request to an infection source
Sending an HTTP POST request to an infection source
Unauthorized injection to a system process
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 476661 Sample: l9iqEhEbQg.exe Startdate: 02/09/2021 Architecture: WINDOWS Score: 100 126 Multi AV Scanner detection for domain / URL 2->126 128 Antivirus detection for URL or domain 2->128 130 Antivirus detection for dropped file 2->130 132 15 other signatures 2->132 12 l9iqEhEbQg.exe 18 2->12         started        15 rundll32.exe 2->15         started        process3 file4 94 C:\Users\user\AppData\...\setup_install.exe, PE32 12->94 dropped 96 C:\Users\user\AppData\...\Mon17fb229dc81.exe, PE32 12->96 dropped 98 C:\Users\user\...\Mon17e148a02852c6.exe, PE32 12->98 dropped 100 13 other files (8 malicious) 12->100 dropped 17 setup_install.exe 1 12->17         started        21 rundll32.exe 15->21         started        process5 dnsIp6 104 172.67.142.91 CLOUDFLARENETUS United States 17->104 106 127.0.0.1 unknown unknown 17->106 134 Adds a directory exclusion to Windows Defender 17->134 23 cmd.exe 1 17->23         started        25 cmd.exe 1 17->25         started        28 cmd.exe 1 17->28         started        36 8 other processes 17->36 136 Writes to foreign memory regions 21->136 138 Allocates memory in foreign processes 21->138 140 Creates a thread in another existing process (thread injection) 21->140 30 svchost.exe 21->30 injected 32 svchost.exe 21->32 injected 34 svchost.exe 21->34 injected signatures7 process8 signatures9 38 Mon17fb229dc81.exe 23->38         started        166 Submitted sample is a known malware sample 25->166 168 Obfuscated command line found 25->168 170 Uses ping.exe to sleep 25->170 172 2 other signatures 25->172 43 powershell.exe 25 25->43         started        45 Mon17cbfd883d5a8a.exe 28->45         started        47 Mon179f5456be4f94.exe 36->47         started        49 Mon1730dd0b9f5ce9.exe 36->49         started        51 Mon1767c691152687e.exe 36->51         started        53 4 other processes 36->53 process10 dnsIp11 108 37.0.10.214 WKD-ASIE Netherlands 38->108 110 37.0.10.237 WKD-ASIE Netherlands 38->110 118 7 other IPs or domains 38->118 84 C:\Users\...\w_U8kEuCmWCWDbsfWMjB6MYZ.exe, PE32 38->84 dropped 86 C:\Users\...\nr46QWOweuTSpctNPHksNYkW.exe, PE32 38->86 dropped 88 C:\Users\...\k2ZrJ8uL1dknbHZOfKYRU3ea.exe, PE32 38->88 dropped 92 33 other files (28 malicious) 38->92 dropped 146 Drops PE files to the document folder of the user 38->146 148 Creates HTML files with .exe extension (expired dropper behavior) 38->148 150 Tries to harvest and steal browser information (history, passwords, etc) 38->150 152 Disable Windows Defender real time protection (registry) 38->152 154 Machine Learning detection for dropped file 45->154 156 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 45->156 158 Maps a DLL or memory area into another process 45->158 160 Checks if the current machine is a virtual machine (disk enumeration) 45->160 55 explorer.exe 45->55 injected 57 cmd.exe 47->57         started        59 dllhost.exe 47->59         started        112 88.99.66.31 HETZNER-ASDE Germany 49->112 162 Antivirus detection for dropped file 49->162 114 162.159.134.233 CLOUDFLARENETUS United States 51->114 116 208.95.112.1 TUT-ASUS United States 53->116 120 5 other IPs or domains 53->120 90 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 53->90 dropped 164 Creates processes via WMI 53->164 61 Mon17a35023a4a8d2ff.exe 53->61         started        65 WerFault.exe 53->65         started        file12 signatures13 process14 dnsIp15 67 rundll32.exe 55->67         started        69 cmd.exe 57->69         started        72 conhost.exe 57->72         started        122 104.21.70.98 CLOUDFLARENETUS United States 61->122 102 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 61->102 dropped 74 conhost.exe 61->74         started        124 20.189.173.22 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 65->124 file16 process17 signatures18 142 Obfuscated command line found 69->142 144 Uses ping.exe to sleep 69->144 76 Prendero.exe.com 69->76         started        78 findstr.exe 69->78         started        80 PING.EXE 69->80         started        process19 process20 82 Prendero.exe.com 76->82         started       
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-08-23 19:43:05 UTC
AV detection:
29 of 46 (63.04%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:vidar botnet:706 botnet:7ec37c4e52b45215a7a83ab1f127b87c27384d9a botnet:937 botnet:pub1 botnet:test aspackv2 backdoor evasion infostealer persistence stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
viacetequn.site:80
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
45.14.49.169:22411
https://lenko349.tumblr.com/
Unpacked files
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
71719fabe6bbc0fa034312082e16265c04ee4653ea9715ae0337424d31a33acf
MD5 hash:
99ef4b760e5f96a73e4f642601901bd9
SHA1 hash:
d4bb6241c67af0a60bb867ae107c8e71a72526e5
SH256 hash:
4c77bea95191fa009542d15575ece58f7ea1ad086e97d980360d743ccce42cf6
MD5 hash:
2908a235b37868deeaf21f8824880aaf
SHA1 hash:
d474c9a5a57af51522db2cf51ea0f9570fd61bd5
SH256 hash:
3bfe9cbd6cb168008b734de95f2eea8894a9b10530a3acd37ec2fa640c1c1e74
MD5 hash:
e7d194d175b098778e28813c6a233d49
SHA1 hash:
c21fe53457d0e165f1a7910d5180715abd3d0014
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
710c8df4e791a0f4ac8a7351c0c718a6ddb685a3d57abfd2c064c398617bb9b1
MD5 hash:
4ffcfe89a6f218943793ff6ea9bb5e79
SHA1 hash:
8ff66c6fe276857ba0ce6f533d383813e5ce6943
SH256 hash:
b85d261f8298cd9fa73be088677da6518109f110107f18e518582873b67f432d
MD5 hash:
8091fc54ea99137a95f1ffb1443c2f24
SHA1 hash:
42e4690c8360d1993e88d0c0762989e4a352e203
SH256 hash:
302c2d3abfc448b17a7f9efab8e2171f0403db5c410a55c0684735dc111d95cf
MD5 hash:
031cb51534f1630ba7df900a2b3e1937
SHA1 hash:
2c2e43bf5e055701b1ca46536cfac3e287dabdc8
SH256 hash:
350448f97672c49b440b455a1559b13325308cd0f7935d1e65547479e25ebcca
MD5 hash:
b243f50ca857c5437893116c1cd70e6a
SHA1 hash:
a2c6db9031cd9d4485c29a5049e7b9f05e9491b1
SH256 hash:
2311eea491c2a5a4386c38bb172370df1e673fdf8bee4db411266347e82e532f
MD5 hash:
f3a51f22341ee311187a1af882ab1de5
SHA1 hash:
44e14ca64cab4f51ed2a3c3147afdd9a3b941316
SH256 hash:
2ddd2d4c0801251858f35d6ba16fc49fac86f62937ba93052aecafe1efc0c764
MD5 hash:
866be290edc698aaa049516fdd7d13be
SHA1 hash:
3c62d7b4cc9c2db6e976f4c25b4e57f3e1ae77c3
SH256 hash:
c3a3687a857763f5a3b63e49f160f3e4d29af623d2d5a3a9d5172cd289368810
MD5 hash:
d28c58fa9aa8230336def04ce992f1bf
SHA1 hash:
6018a95e02a84c252fc48e4666240456cc16ba7e
SH256 hash:
65a9f911b785e76df21192381f50943bea473863f8ef1e0546326727aa37d4a8
MD5 hash:
dbb90748cbefd60d53a3adb29e7bd7e2
SHA1 hash:
4b3f8276ef6d59c422c95c62a1711d11b3b3d588
SH256 hash:
9453ddc4bebb87a937e3d53d38c56814907b2862496142ccdb568f48caf2d467
MD5 hash:
eb6db30e23d77e2740d98a5c23fe0920
SHA1 hash:
e61ecab00d442eced5be53a52f4ee04df54747f8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments