MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad226d0d0d65f6b2cf338844fad2229e5556df67303fdcd0ba079f6c0dd0345e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: ad226d0d0d65f6b2cf338844fad2229e5556df67303fdcd0ba079f6c0dd0345e
SHA3-384 hash: dffe7e9bfb95ffd631103c21a3938b9e58238a4adfc1613947dd2ae4a58a878680a6c22b344f503f91c895d2098f6a04
SHA1 hash: dc9bd2b73ce19fb63ab941d392a79ee8b49b38e9
MD5 hash: e02d7e72ac3c10c149242b621c698c25
humanhash: seventeen-one-red-wolfram
File name:e02d7e72ac3c10c149242b621c698c25.exe
Download: download sample
Signature Tofsee
File size:295'424 bytes
First seen:2021-11-03 09:46:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e51d9833813c1a3fb57baba54855909 (2 x RedLineStealer, 1 x Loki, 1 x IcedID)
ssdeep 6144:0MkYpOwqapK9JtUYHzV+KVZFEM444mzfwzHWIDa:07KOw9StT+mEM44Pfwz2I
TLSH T1A3549D10ABA1C035F0B256F88ABA9379B83F79A1AB3454CF12D517ED5634AE1EC31347
File icon (PE):PE icon
dhash icon badacabecee6baa6 (95 x Stop, 87 x RedLineStealer, 62 x Smoke Loader)
Reporter abuse_ch
Tags:exe Tofsee


Avatar
abuse_ch
Tofsee C2:
45.153.186.153:56675

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.153.186.153:56675 https://threatfox.abuse.ch/ioc/241798/

Intelligence


File Origin
# of uploads :
1
# of downloads :
701
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e02d7e72ac3c10c149242b621c698c25.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-03 09:48:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Tofsee
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Renames NTDLL to bypass HIPS
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 514490 Sample: NDNAgkkfhi.exe Startdate: 03/11/2021 Architecture: WINDOWS Score: 100 97 quadoil.ru 2->97 99 nusurtal4f.net 2->99 101 2 other IPs or domains 2->101 145 Multi AV Scanner detection for domain / URL 2->145 147 Antivirus detection for URL or domain 2->147 149 Antivirus detection for dropped file 2->149 151 15 other signatures 2->151 12 NDNAgkkfhi.exe 2->12         started        15 djehqzzu.exe 2->15         started        17 ddbdvji 2->17         started        signatures3 process4 signatures5 169 Contains functionality to inject code into remote processes 12->169 171 Injects a PE file into a foreign processes 12->171 19 NDNAgkkfhi.exe 12->19         started        173 Detected unpacking (changes PE section rights) 15->173 175 Detected unpacking (overwrites its own PE header) 15->175 177 Writes to foreign memory regions 15->177 179 Allocates memory in foreign processes 15->179 22 svchost.exe 15->22         started        181 Machine Learning detection for dropped file 17->181 25 ddbdvji 17->25         started        process6 dnsIp7 153 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 19->153 155 Maps a DLL or memory area into another process 19->155 157 Checks if the current machine is a virtual machine (disk enumeration) 19->157 27 explorer.exe 18 19->27 injected 103 quadoil.ru 85.143.175.153, 443, 49826, 49882 TRADERSOFTRU Russian Federation 22->103 105 microsoft-com.mail.protection.outlook.com 40.93.212.0, 25, 49820 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->105 159 System process connects to network (likely due to code injection or exploit) 22->159 161 Creates a thread in another existing process (thread injection) 25->161 signatures8 process9 dnsIp10 117 hajezey10.top 27->117 119 192.162.246.70, 49768, 80 DATACHEAP-LLC-ASRU Russian Federation 27->119 121 5 other IPs or domains 27->121 87 unknown (copy), PE32 27->87 dropped 89 C:\Users\user\AppData\Roaming\ddbdvji, PE32 27->89 dropped 91 C:\Users\user\AppData\Local\Temp\F7CD.exe, PE32 27->91 dropped 93 9 other files (8 malicious) 27->93 dropped 183 System process connects to network (likely due to code injection or exploit) 27->183 185 Benign windows process drops PE files 27->185 187 Deletes itself after installation 27->187 189 Hides that the sample has been downloaded from the Internet (zone.identifier) 27->189 32 EA3.exe 1 27->32         started        36 EDC9.exe 2 27->36         started        38 396E.exe 27->38         started        40 5 other processes 27->40 file11 signatures12 process13 dnsIp14 75 C:\Users\user\AppData\Local\Temp\1105.tmp, PE32 32->75 dropped 123 DLL reload attack detected 32->123 125 Detected unpacking (changes PE section rights) 32->125 127 Machine Learning detection for dropped file 32->127 143 2 other signatures 32->143 77 C:\Users\user\AppData\Local\...\djehqzzu.exe, PE32 36->77 dropped 129 Detected unpacking (overwrites its own PE header) 36->129 131 Uses netsh to modify the Windows network and firewall settings 36->131 133 Modifies the windows firewall 36->133 43 cmd.exe 1 36->43         started        46 cmd.exe 2 36->46         started        48 sc.exe 1 36->48         started        54 3 other processes 36->54 135 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 38->135 137 Maps a DLL or memory area into another process 38->137 139 Checks if the current machine is a virtual machine (disk enumeration) 38->139 111 45.9.20.149, 10844, 49862 DEDIPATH-LLCUS Russian Federation 40->111 113 cdn.discordapp.com 162.159.130.233, 443, 49823, 49827 CLOUDFLARENETUS United States 40->113 115 192.168.2.1 unknown unknown 40->115 79 C:\Users\user\AppData\Local\...\livelong.vbs, ASCII 40->79 dropped 81 C:\Users\user\AppData\Local\...\adduce.exe, PE32 40->81 dropped 83 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 40->83 dropped 141 Adds a directory exclusion to Windows Defender 40->141 50 wscript.exe 1 40->50         started        52 8B23.exe 40->52         started        file15 signatures16 process17 file18 85 C:\Windows\SysWOW64\...\djehqzzu.exe (copy), PE32 43->85 dropped 56 conhost.exe 43->56         started        58 conhost.exe 46->58         started        60 conhost.exe 48->60         started        62 adduce.exe 50->62         started        65 conhost.exe 54->65         started        67 conhost.exe 54->67         started        69 conhost.exe 54->69         started        process19 file20 95 C:\Users\user\AppData\Local\...\regimes.exe, PE32 62->95 dropped 71 regimes.exe 62->71         started        process21 dnsIp22 107 162.159.135.233, 443, 49836 CLOUDFLARENETUS United States 71->107 109 cdn.discordapp.com 71->109 163 Machine Learning detection for dropped file 71->163 165 Hides threads from debuggers 71->165 167 Injects a PE file into a foreign processes 71->167 signatures23
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2021-11-03 09:47:05 UTC
AV detection:
21 of 45 (46.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid family:redline family:smokeloader family:tofsee family:vidar family:xmrig botnet:101 botnet:706 botnet:76567567 botnet:love botnet:superstar campaign:3022016856 backdoor banker discovery evasion infostealer miner persistence spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Core1 .NET packer
Vidar Stealer
XMRig Miner Payload
IcedID, BokBot
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Tofsee
Vidar
Windows security bypass
suricata: ET MALWARE Known Sinkhole Response Header
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/IcedID Request Cookie
xmrig
Malware Config
C2 Extraction:
http://honawey70.top/
http://wijibui00.top/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
http://193.56.146.214/
https://193.56.146.214/
quadoil.ru
lakeflex.ru
185.215.113.29:36224
93.115.20.139:28978
actuallyobligat.info
91.242.229.222:21475
185.92.73.142:52097
https://mas.to/@romashkin
Unpacked files
SH256 hash:
6adf4031225d8cd75191c0af65deaa09ae21f01e6fdcc8d3b342b2f36f6743f0
MD5 hash:
c6e8f3b5e26a4cf2f571658ca81e47d7
SHA1 hash:
fe66b6b82adecb21182f281b9a2358bd60aa7fee
SH256 hash:
ad226d0d0d65f6b2cf338844fad2229e5556df67303fdcd0ba079f6c0dd0345e
MD5 hash:
e02d7e72ac3c10c149242b621c698c25
SHA1 hash:
dc9bd2b73ce19fb63ab941d392a79ee8b49b38e9
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Tofsee

Executable exe ad226d0d0d65f6b2cf338844fad2229e5556df67303fdcd0ba079f6c0dd0345e

(this sample)

  
Delivery method
Distributed via web download

Comments