MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9ab3974177adbac89ee70f9ca1eb8d9a1db104243bb87e41245c26518177613b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 8


Intelligence 8 IOCs 3 YARA 12 File information Comments

SHA256 hash: 9ab3974177adbac89ee70f9ca1eb8d9a1db104243bb87e41245c26518177613b
SHA3-384 hash: d49c4eae9710fe6882aff6d18c7083c8ad1e55bc8230d460e6f3a3fab49c7f3c6b768e9572ed7a44170ebe9d854942d1
SHA1 hash: 10fed38de0278056b6b148cdcc6f831bc22e9bcb
MD5 hash: db4a917bdaa25195ccb4706b77a817f6
humanhash: grey-quiet-december-oklahoma
File name:DB4A917BDAA25195CCB4706B77A817F6.exe
Download: download sample
Signature Adware.FileTour
File size:3'919'181 bytes
First seen:2021-06-08 07:09:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e7f9a29f2c85394521a08b9f31f6275 (278 x GuLoader, 44 x RemcosRAT, 40 x VIPKeylogger)
ssdeep 98304:Jo5RGDH+SH8Wzo/c8Eo6e3utLvyao3ZXil6Jj1cQjyyQwuedhwIYRN:Jo56HTcWzo08Eo6fR+ZSMJpcQjyjwld0
Threatray 41 similar samples on MalwareBazaar
TLSH 8B0633E0596582E2EB430EB46C8DAF2B4BF5896417741662BE30D7C47F1BDB40927B0E
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
162.55.55.250:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
162.55.55.250:80 https://threatfox.abuse.ch/ioc/67974/
80.92.206.22:80 https://threatfox.abuse.ch/ioc/68028/
185.215.113.204:23302 https://threatfox.abuse.ch/ioc/68044/

Intelligence


File Origin
# of uploads :
1
# of downloads :
198
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DB4A917BDAA25195CCB4706B77A817F6.exe
Verdict:
No threats detected
Analysis date:
2021-06-08 07:48:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a custom TCP request
Creating a process from a recently created file
Creating a file
Searching for the window
DNS request
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
Antivirus detection for dropped file
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 430990 Sample: Gk51g24eTf.exe Startdate: 08/06/2021 Architecture: WINDOWS Score: 84 36 Multi AV Scanner detection for domain / URL 2->36 38 Antivirus detection for dropped file 2->38 40 Multi AV Scanner detection for dropped file 2->40 42 3 other signatures 2->42 8 Gk51g24eTf.exe 9 2->8         started        process3 file4 22 C:\Users\user\AppData\...\setup_installer.exe, PE32 8->22 dropped 11 setup_installer.exe 16 8->11         started        process5 file6 24 C:\Users\user\AppData\...\setup_install.exe, PE32 11->24 dropped 26 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 11->26 dropped 28 C:\Users\user\AppData\Local\...\metina_6.exe, PE32 11->28 dropped 30 11 other files (6 malicious) 11->30 dropped 14 setup_install.exe 1 11->14         started        process7 dnsIp8 32 estrix.xyz 14->32 34 127.0.0.1 unknown unknown 14->34 44 Performs DNS queries to domains with low reputation 14->44 18 WerFault.exe 23 9 14->18         started        20 conhost.exe 14->20         started        signatures9 process10
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-05-31 21:46:52 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
aspackv2
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Loads dropped DLL
ASPack v2.12-2.42
Executes dropped EXE
Unpacked files
SH256 hash:
f7a22d383fb7c74e0e9b4b3907eeaf44acae4fe4a741face453d107eadd9ccfe
MD5 hash:
aabc7a3044ba7ea1594c0eab199d9547
SHA1 hash:
8d4143739f9c32c66ad6ac096cec8b6725f20218
SH256 hash:
9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc
MD5 hash:
957460132c11b2b5ea57964138453b00
SHA1 hash:
12e46d4c46feff30071bf8b0b6e13eabba22237f
SH256 hash:
b0db2125ca1e06878a03c3051e459532cf9f61a7266ed11ec5c30ea63558aa46
MD5 hash:
d96d1e3735bfb894fbb14533b1b85886
SHA1 hash:
e97e1648609e47314e3a3431a11bc25ad4b30b73
SH256 hash:
aaaa54339d43ffc3aa9728557d91a90a246dedc070e398919bcc3ee1809c922a
MD5 hash:
f5f1fb47109e5f7111e0a5b7eb98a14b
SHA1 hash:
d03be54360caa04085c97a726c5c11fd82954ac1
SH256 hash:
dd76dacb4cf77726e95ed79f9ca5a56e878da89902c0eacb7c146e40122549b3
MD5 hash:
c4d8e5ea0d18d418c41145116ff52fe4
SHA1 hash:
00fe4def6d8e3a9fbec9ca61096d5457804dcf12
SH256 hash:
36d4445c2dfc10d24dc706f7a295973196f7a9d61dc87ee3cd0354c3f0394408
MD5 hash:
6419081ab1062b2a7ff3ed7f9c847658
SHA1 hash:
fa6c1bd495ecda6f0f9628ecf391a9767303c8a8
SH256 hash:
2e6bab42101f48676f2d80e159004d538c8f5f24ab09d59e1b6e0f0675ffe0b3
MD5 hash:
1c817c4ed662ca6b0ba467121bfb6b79
SHA1 hash:
81d6a3119bb678a3e6370c77197ab994b500a0c9
SH256 hash:
9f319dab97c8bc89cd3c9333d5aa1d410411d9ff704e6456c98ca287cf937e13
MD5 hash:
a4ffed759efd8d98e53520687a6fa82f
SHA1 hash:
4eb61789626a471149624eec88e9bb85bf9fd09f
SH256 hash:
e8a7fc6bd7f99422c622992247b4142b2df64ed7b0f87cd2bc2c6eac099b0f41
MD5 hash:
2a0f0ae3216ebd6c08efaf6c80e1d2ed
SHA1 hash:
bd10ae9bb9ca1820e17b2a81651d50cddfb7f325
SH256 hash:
26612f977e601dce9dd60308e2098f2730249373050586f7dba403219e4745e3
MD5 hash:
2e68836764fe610204084e712b15cdd0
SHA1 hash:
a39af6ae81d3801f6c3579347351e35f5747dfe6
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
28020c8e7fccc47fcf37896f6828b3f978fc946764fc8b416a088b65ff166860
MD5 hash:
f9aa38507c2fe82e4186b7bc25e1b093
SHA1 hash:
3021547606460a99fe8391ff0a932d8df8601842
SH256 hash:
16475b2a669b3861115e4d166097006d9a523b4e73be8446efc166fdee8174f3
MD5 hash:
6024b3fd3069c2492fdc0b22626cf78c
SHA1 hash:
2e2ca98c9e2f9f8b41557c1bda11fc27ff8f5804
SH256 hash:
48dcd9dd2293c0eb836460916be8bcf08d20191e1af9851ff5bc75b7344eb905
MD5 hash:
2db518688116cdd0bf10081244f4dc66
SHA1 hash:
26f13e8c836ed665440547a5053583a4d20185cf
SH256 hash:
08e7bd0f28b7ce09922bf6551be3475075594da2343352dfa547b2dc601603e5
MD5 hash:
86e3a2e9d9bf3df4d5fec1f0b7074b02
SHA1 hash:
2315e22fe1fe767a29f4e98844c9307019075803
SH256 hash:
bf523c21caa9dad41c5ae81df03e46fce44989267753de4d7811697de264086f
MD5 hash:
3592100ce6c2805560a3ba6feb26ab0f
SHA1 hash:
1f40fc5d1b6d51fa26609743dfa74f1df6d85df3
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
094319557ec2597a283ae58e4e156e0d6912107db98363a9e85c6f1c4f536bd8
MD5 hash:
dc8401b63b0ce22790a97f029890adf4
SHA1 hash:
660521d4037d3fd30790651913a757b0bb4ef5bb
SH256 hash:
564214b8ba70424cf58baca9e48bf3db6a0c4ea3103dd01d70f762725acaa80f
MD5 hash:
d82b294d2d03c8ca03354d38defac54d
SHA1 hash:
95286ef84fc1da226a3b02783ce817f9ed933c95
SH256 hash:
300bd5f83d8cd680db2b22383276391fa3140cfa944b04d67341a161504046dd
MD5 hash:
8078fbdc44bc758157d21310681a05e5
SHA1 hash:
5384f7157e15f85f92eb331b05861f9e8ca2860e
SH256 hash:
d99d89bc9a4cd7a771a6b8a6adc99701ff64c3122efc311901025a12a987983f
MD5 hash:
001771205540a4291f9667974c00f125
SHA1 hash:
30a66a6568890cfa37741d8f6ddc643900cc49c1
SH256 hash:
2f7d75fe5558a89e0ee50c99281fc0d9541c7fd86925ba16e38165fbd640d752
MD5 hash:
25ae102d9422df4ea61b04570d43150c
SHA1 hash:
64f545649647e60b1de4f714cde2d8d6f76f13f0
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
c92db32f5a4f8124b202314fa6a1de1ad74a3a6616f7900b1b754644ebcc287f
MD5 hash:
c43149ecccd85be7c905fbba08477889
SHA1 hash:
4b81971019e4048a74909aa5afe4706ccd49df80
SH256 hash:
9ab3974177adbac89ee70f9ca1eb8d9a1db104243bb87e41245c26518177613b
MD5 hash:
db4a917bdaa25195ccb4706b77a817f6
SHA1 hash:
10fed38de0278056b6b148cdcc6f831bc22e9bcb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments