MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a75947e7809e5629f8a4119f06834d01c0a09bb2f25c2a1527caf37f685d4292. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.FileTour


Vendor detections: 10


Intelligence 10 IOCs 2 YARA File information Comments

SHA256 hash: a75947e7809e5629f8a4119f06834d01c0a09bb2f25c2a1527caf37f685d4292
SHA3-384 hash: b4adaa4d73e072f10268c85b0fffc38a9a5027869c60142b8080dc179576f929c2e911e667087adee70e9a22dc45d8c6
SHA1 hash: f14119fd48faf4e67f2830377e59c971e97bb655
MD5 hash: a90feb9b28a784657ec9a9b2a7bd7122
humanhash: enemy-bulldog-table-mars
File name:a90feb9b28a784657ec9a9b2a7bd7122.exe
Download: download sample
Signature Adware.FileTour
File size:1'087'248 bytes
First seen:2021-06-22 11:45:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1dd9e0c90802c146c30db4b322f2aa9e (1 x RedLineStealer, 1 x Adware.FileTour, 1 x DiamondFox)
ssdeep 24576:rJeo26y1eqAyY6fNC1TawJXO+Tb5OMvicKt:R92NC1TawJ/gcKt
Threatray 26 similar samples on MalwareBazaar
TLSH 7035E041FE8294F3E5A220B151F6AB761D39653147109AD3D3C85AF54E203F0AB3B7AE
Reporter abuse_ch
Tags:Adware.FileTour exe


Avatar
abuse_ch
Adware.FileTour C2:
http://cypwua22.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://cypwua22.top/index.php https://threatfox.abuse.ch/ioc/139823/
http://morutv02.top/index.php https://threatfox.abuse.ch/ioc/139824/

Intelligence


File Origin
# of uploads :
1
# of downloads :
158
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a90feb9b28a784657ec9a9b2a7bd7122.exe
Verdict:
Malicious activity
Analysis date:
2021-06-22 11:46:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Detected potential unwanted application
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Sigma detected: BlueMashroom DLL Load
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 438334 Sample: wbEjg6mZB8.exe Startdate: 22/06/2021 Architecture: WINDOWS Score: 84 45 r3.o.lencr.org 2->45 47 echo.bluewavecdn.com 2->47 55 Antivirus detection for URL or domain 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 Sigma detected: BlueMashroom DLL Load 2->59 61 Detected potential unwanted application 2->61 9 wbEjg6mZB8.exe 3 2->9         started        signatures3 process4 file5 43 C:\Users\user\AppData\Local\Temp\Setup.exe, PE32 9->43 dropped 12 Setup.exe 2 9->12         started        process6 dnsIp7 49 spark.lightburst.xyz 195.181.169.92, 443, 49757 CDN77GB United Kingdom 12->49 51 127.0.0.1 unknown unknown 12->51 63 Multi AV Scanner detection for dropped file 12->63 65 Performs DNS queries to domains with low reputation 12->65 67 Adds a directory exclusion to Windows Defender 12->67 16 cmd.exe 1 12->16         started        19 cmd.exe 1 12->19         started        21 cmd.exe 12->21         started        23 3 other processes 12->23 signatures8 process9 signatures10 53 Adds a directory exclusion to Windows Defender 16->53 25 powershell.exe 26 16->25         started        27 conhost.exe 16->27         started        29 powershell.exe 17 19->29         started        31 conhost.exe 19->31         started        39 2 other processes 21->39 33 powershell.exe 17 23->33         started        35 conhost.exe 23->35         started        37 conhost.exe 23->37         started        41 3 other processes 23->41 process11
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-06-19 07:01:00 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar persistence stealer vmprotect
Behaviour
GoLang User-Agent
Kills process with taskkill
Modifies data under HKEY_USERS
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
autoit_exe
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar Stealer
Vidar
Unpacked files
SH256 hash:
5722c6e6d7e6dc805b906a861c6833f6065299e50303bfb2b56d701eaef1a8e8
MD5 hash:
84ce449e3c0ee62bfcb080c5be396d1f
SHA1 hash:
576e91d8cc200d1bd1ecb4da306468e57dd9061f
SH256 hash:
a75947e7809e5629f8a4119f06834d01c0a09bb2f25c2a1527caf37f685d4292
MD5 hash:
a90feb9b28a784657ec9a9b2a7bd7122
SHA1 hash:
f14119fd48faf4e67f2830377e59c971e97bb655
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments