MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a4520e17b63c5503219d9c36435b26054ac63e4539883c5244b3129535d82879. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
TeamBot
Vendor detections: 11
| SHA256 hash: | a4520e17b63c5503219d9c36435b26054ac63e4539883c5244b3129535d82879 |
|---|---|
| SHA3-384 hash: | beb949ad445e820b2218be4c581a348a0b4a4adc6edc9861d3589c96c983f1b3a2cbfa01deb16373398ba7a16165e5ba |
| SHA1 hash: | cefca2c4538365655cb1eead3f3390313b9ea18a |
| MD5 hash: | e950889fc7f88cbc4408d934e2e220f6 |
| humanhash: | diet-crazy-cola-social |
| File name: | e950889fc7f88cbc4408d934e2e220f6.exe |
| Download: | download sample |
| Signature | TeamBot |
| File size: | 818'176 bytes |
| First seen: | 2021-08-01 05:55:59 UTC |
| Last seen: | 2021-08-01 06:42:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c8b9c145ec19b60e1b1e5259a226415a (2 x RedLineStealer, 1 x TeamBot, 1 x Stop) |
| ssdeep | 12288:LVHqYgXjvWYZeTPFWz5RNUDIFUEW00h/HsS54HWuE:LVKvXj7ZeTd8/0IyT00/54HW |
| Threatray | 405 similar samples on MalwareBazaar |
| TLSH | T16C0512607581C476C7500A3084A597B0672ABCF1893409073F683BFEAEF73F196A9E5B |
| dhash icon | 4839b2b4e8c38890 (137 x RaccoonStealer, 37 x Smoke Loader, 30 x RedLineStealer) |
| Reporter | |
| Tags: | exe TeamBot |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://astdg.top/fhsgtsspen6/get.php | https://threatfox.abuse.ch/ioc/165211/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
1'430
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e950889fc7f88cbc4408d934e2e220f6.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-01 05:57:10 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
STOP
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
STOP Ransomware
Verdict:
Malicious
Result
Threat name:
Djvu
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found ransom note / readme
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Yara detected Djvu Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Hynamer
Status:
Malicious
First seen:
2021-08-01 06:24:48 UTC
AV detection:
23 of 46 (50.00%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 395 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:vidar botnet:517 discovery persistence spyware stealer suricata
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Vidar
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
https://shpak125.tumblr.com/
Unpacked files
SH256 hash:
d459f6df74ee30219819b78ba2a514221820baf1897fb6c299587d71f2abd974
MD5 hash:
daa79e7e403deffea26d3537500f1f95
SHA1 hash:
cf33f01bf3b1f053f38f223994c7805002d9ac68
Detections:
win_stop_auto
Parent samples :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 hash:
a4520e17b63c5503219d9c36435b26054ac63e4539883c5244b3129535d82879
MD5 hash:
e950889fc7f88cbc4408d934e2e220f6
SHA1 hash:
cefca2c4538365655cb1eead3f3390313b9ea18a
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.