MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5f4eb3b915bcfdd72cb81b7d89c0c0fd6b190b637db6ffad25604d24985f9e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 14


Intelligence 14 IOCs 4 YARA 15 File information Comments

SHA256 hash: a5f4eb3b915bcfdd72cb81b7d89c0c0fd6b190b637db6ffad25604d24985f9e8
SHA3-384 hash: 822220a5f1c61d521c8a2c66be3e09c19ab05dfef72d51012264529ddde8f271d5144bcc9e0907bf46dee8ac998da5b7
SHA1 hash: acf66cababaeba6d72e72d2962405f41052d79a0
MD5 hash: 2d3e5a2a2243d788901fb182156f4031
humanhash: happy-six-east-mobile
File name:A5F4EB3B915BCFDD72CB81B7D89C0C0FD6B190B637DB6.exe
Download: download sample
Signature DiamondFox
File size:4'749'755 bytes
First seen:2021-08-17 21:55:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:Jwg2hGtNVybTZMYTX1Wnlz1vdN0J5Nfm/Fb0bIQ81NN25Fv:JwvhoybtMYxWZBGBm9b0bIJ5Ol
Threatray 289 similar samples on MalwareBazaar
TLSH T1DC2633387764C043D8E0977024139336C6767C21146E65962BB217DAB1B2FC9FAAF36E
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
185.186.142.245:1778

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.186.142.245:1778 https://threatfox.abuse.ch/ioc/191733/
195.2.78.147:59722 https://threatfox.abuse.ch/ioc/191737/
94.140.112.18:80 https://threatfox.abuse.ch/ioc/191767/
45.14.49.200:27625 https://threatfox.abuse.ch/ioc/191768/

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
http://enedi.ru/
Verdict:
Malicious activity
Analysis date:
2021-06-29 06:36:37 UTC
Tags:
trojan evasion opendir loader stealer vidar rat redline phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Searching for the window
Moving a recently created file
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Launching the default Windows debugger (dwwin.exe)
Sending an HTTP GET request to an infection source
Launching a process
Sending an HTTP GET request
Creating a window
Creating a process with a hidden window
Deleting a recently created file
Reading critical registry keys
Sending a UDP request
Sending an HTTP POST request
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer RedLine SmokeLoader Vi
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Backstage Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 467194 Sample: A5F4EB3B915BCFDD72CB81B7D89... Startdate: 17/08/2021 Architecture: WINDOWS Score: 100 100 52.168.117.173 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->100 102 104.21.42.63 CLOUDFLARENETUS United States 2->102 104 198.13.62.186 AS-CHOOPAUS United States 2->104 126 Multi AV Scanner detection for dropped file 2->126 128 Multi AV Scanner detection for submitted file 2->128 130 Yara detected Backstage Stealer 2->130 132 10 other signatures 2->132 12 A5F4EB3B915BCFDD72CB81B7D89C0C0FD6B190B637DB6.exe 10 2->12         started        16 svchost.exe 2->16         started        18 svchost.exe 1 2->18         started        signatures3 process4 dnsIp5 124 192.168.2.1 unknown unknown 12->124 98 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->98 dropped 20 setup_installer.exe 15 12->20         started        23 WerFault.exe 16->23         started        file6 process7 file8 64 C:\Users\user\AppData\Local\...\sonia_7.txt, PE32 20->64 dropped 66 C:\Users\user\AppData\Local\...\sonia_6.txt, PE32 20->66 dropped 68 C:\Users\user\AppData\Local\...\sonia_5.txt, PE32 20->68 dropped 70 10 other files (none is malicious) 20->70 dropped 25 setup_install.exe 1 20->25         started        process9 dnsIp10 120 8.8.8.8 GOOGLEUS United States 25->120 122 127.0.0.1 unknown unknown 25->122 90 C:\Users\user\AppData\...\sonia_6.exe (copy), PE32 25->90 dropped 92 C:\Users\user\AppData\...\sonia_5.exe (copy), PE32 25->92 dropped 94 C:\Users\user\AppData\...\sonia_3.exe (copy), PE32 25->94 dropped 96 4 other files (1 malicious) 25->96 dropped 29 cmd.exe 1 25->29         started        31 cmd.exe 1 25->31         started        33 cmd.exe 1 25->33         started        35 5 other processes 25->35 file11 process12 process13 37 sonia_5.exe 73 29->37         started        42 sonia_1.exe 5 31->42         started        44 sonia_2.exe 1 33->44         started        46 sonia_4.exe 1 1 35->46         started        48 sonia_6.exe 35->48         started        50 sonia_7.exe 35->50         started        52 sonia_3.exe 12 35->52         started        dnsIp14 106 185.233.185.134 YURTEH-ASUA Russian Federation 37->106 108 136.144.41.133 WORLDSTREAMNL Netherlands 37->108 118 18 other IPs or domains 37->118 72 C:\Users\...\zh1fjRLs2i5ik_a5PWCKhFJj.exe, PE32 37->72 dropped 74 C:\Users\...\yrWwHMj5pT5bzD2UaU2njHC5.exe, PE32+ 37->74 dropped 76 C:\Users\...\x89ED_tCM8JD5qwviPOO5JfC.exe, PE32 37->76 dropped 86 55 other files (34 malicious) 37->86 dropped 142 Drops PE files to the document folder of the user 37->142 144 Creates HTML files with .exe extension (expired dropper behavior) 37->144 146 Disable Windows Defender real time protection (registry) 37->146 78 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 42->78 dropped 54 rundll32.exe 42->54         started        80 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 44->80 dropped 148 DLL reload attack detected 44->148 150 Renames NTDLL to bypass HIPS 44->150 152 Checks if the current machine is a virtual machine (disk enumeration) 44->152 110 208.95.112.1 TUT-ASUS United States 46->110 112 157.240.17.35 FACEBOOKUS United States 46->112 114 45.136.151.102 ENZUINC-US Latvia 46->114 82 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 46->82 dropped 57 jfiag3g_gg.exe 46->57         started        154 Injects a PE file into a foreign processes 48->154 59 sonia_6.exe 48->59         started        84 C:\Users\user\AppData\Local\Temp\liqian.exe, PE32 50->84 dropped 88 2 other files (none is malicious) 50->88 dropped 116 74.114.154.18 AUTOMATTICUS Canada 52->116 file15 signatures16 process17 signatures18 134 Writes to foreign memory regions 54->134 136 Allocates memory in foreign processes 54->136 138 Creates a thread in another existing process (thread injection) 54->138 61 svchost.exe 54->61 injected 140 Tries to harvest and steal browser information (history, passwords, etc) 57->140 process19 signatures20 156 Sets debug register (to hijack the execution of another thread) 61->156 158 Modifies the context of a thread in another process (thread injection) 61->158
Threat name:
Win32.Trojan.Brook
Status:
Malicious
First seen:
2021-06-29 10:02:12 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:raccoon family:redline family:smokeloader family:vidar botnet:171b0ea0beebb33c2d9043b095edfe8ec188b323 botnet:706 botnet:domani aspackv2 backdoor discovery dropper evasion infostealer loader persistence spyware stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
Raccoon Stealer Payload
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
ergerr3.top:80
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
https://sergeevih43.tumblr.com/
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
a1fae083575d7e76d6058cc985bded369804ff2757336c5d7d8d381076caa28d
MD5 hash:
c1c981ff48980b0e7fae87dbc2c24ea2
SHA1 hash:
1cf231b13ecc26c618f663ae4539904e65414e98
SH256 hash:
10a122bd647c88aa23f96687e26b251862e83be9dbb89532f4a578689547972d
MD5 hash:
89c739ae3bbee8c40a52090ad0641d31
SHA1 hash:
d0f7dc9a0a3e52af0f9f9736f26e401636c420a1
SH256 hash:
a35e54276be91d0884c59a9086d2767da82c848d1c635e09032288fae9cfe923
MD5 hash:
ae66cf99f6d4ae8b84138fc9df1ad96f
SHA1 hash:
1a3081a1b614e2c7d7591649628811053c1ef1a0
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
MD5 hash:
987d0f92ed9871031e0061e16e7bbac4
SHA1 hash:
b69f3badc82b6da0ff311f9dc509bac244464332
SH256 hash:
99e190c5cfbc1ac8b56d4a8cbf854a9c9cf3431b27e8506e47be9bc6c9fcb769
MD5 hash:
6f5dda421a240fc97d756701f49f1cfe
SHA1 hash:
7fe94330b5db716a1c44438ba6033223463236de
SH256 hash:
930bc5b0b462717f8600748310aeafb9438fb4ce66fa4ec909ba8bb839c9fd32
MD5 hash:
a6b7f38c42ee07a5c19c3fa8960fc570
SHA1 hash:
58cfa1e7ba0132e35b8ff5aea6d7be8b348de170
SH256 hash:
7bee57f9b847de271f526f9bca03cab459b7f51aec5e740587fa93fbb72fa4e9
MD5 hash:
e559ba3b753e3436067d4c3dbd262670
SHA1 hash:
4594839861a5ed4ef2f2661918fb6d947d28ae8f
SH256 hash:
00d09d8ed7454db00269d089f28be3b2e6d2361b3d79b390980a2903a9388024
MD5 hash:
171251b4eab6944ed501b83cbbf69d27
SHA1 hash:
452a5deb7a85323aeebc12baf32eab734c0a5109
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
f114f87f9fb393c44fc2581838971b304ed5efe11c9523d3e111da3192939a61
MD5 hash:
f603f8c12fad9326add3f3d5895165b8
SHA1 hash:
63750f8963aaf9ef2e7ee724b370f32ffeb39018
SH256 hash:
45aba5d007f9a9a4f42e03e0120473ec995e8c56f994bf8fd0879f9ec24785bf
MD5 hash:
87cfb39f783a257dfa65f9ad6caa5bc6
SHA1 hash:
832b1d0c015cb2a18bfeb9bb890a0f1f2ed345fc
SH256 hash:
a5f4eb3b915bcfdd72cb81b7d89c0c0fd6b190b637db6ffad25604d24985f9e8
MD5 hash:
2d3e5a2a2243d788901fb182156f4031
SHA1 hash:
acf66cababaeba6d72e72d2962405f41052d79a0
Malware family:
RedLine
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments