MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae5f6a5007c02c48f4bba3dd694c528f500f8e12ec106661149e4a3d1f678c8d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Redosdru


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 10 File information Comments

SHA256 hash: ae5f6a5007c02c48f4bba3dd694c528f500f8e12ec106661149e4a3d1f678c8d
SHA3-384 hash: 0a658612bff565266f15afa5ffe26b4aea103cdd7b779074fd96d117c657200f57713787f9fc1da51f4574ba2738e54f
SHA1 hash: e0f72ed2c9820f9c008979269282441de1b66f20
MD5 hash: aff7cf93b494c088fb991bebde49df9a
humanhash: item-sixteen-east-mars
File name:aff7cf93b494c088fb991bebde49df9a.exe
Download: download sample
Signature Redosdru
File size:228'777 bytes
First seen:2022-01-01 04:20:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 6144:/QqaV8iAkW9+rk/BOtrgHyI/cXqUul/R0dPE1Nxw/:QVykk+YVy5hWRecPxw/
Threatray 40 similar samples on MalwareBazaar
TLSH T1C62412852BD1E95BE14248F0A9F7472DD3FBBE192B012B67436C3F6F3972181482A346
File icon (PE):PE icon
dhash icon cce8eaf0b4d4d8b8 (1 x Redosdru, 1 x Nitol)
Reporter abuse_ch
Tags:exe Redosdru


Avatar
abuse_ch
Redosdru C2:
110.76.158.75:11024

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
110.76.158.75:11024 https://threatfox.abuse.ch/ioc/290342/

Intelligence


File Origin
# of uploads :
1
# of downloads :
323
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aff7cf93b494c088fb991bebde49df9a.exe
Verdict:
No threats detected
Analysis date:
2022-01-01 04:24:46 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Sending a custom TCP request
Sending an HTTP GET request
Searching for the window
DNS request
Creating a file in the Program Files subdirectories
Searching for synchronization primitives
Creating a window
Creating a file in the %temp% directory
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat Nitol
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if browser processes are running
Connects to many ports of the same IP (likely port scanning)
Contains functionality to automate explorer (e.g. start an application)
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to infect the boot sector
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Renames NTDLL to bypass HIPS
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction which cause usermode exception
Uses known network protocols on non-standard ports
Yara detected GhostRat
Yara detected Nitol
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 546882 Sample: yGP2FE4lLQ.exe Startdate: 01/01/2022 Architecture: WINDOWS Score: 100 77 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->77 79 Multi AV Scanner detection for domain / URL 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 16 other signatures 2->83 8 yGP2FE4lLQ.exe 7 2->8         started        12 svchsot.exe 2->12         started        14 svchsot.exe 2->14         started        process3 file4 43 C:\Windows\Temp\server.exe, PE32 8->43 dropped 45 C:\Windows\Temp\Cacrk.exe, PE32 8->45 dropped 101 Drops executables to the windows directory (C:\Windows) and starts them 8->101 16 server.exe 1 23 8->16         started        21 Cacrk.exe 17 8->21         started        103 Antivirus detection for dropped file 12->103 105 Machine Learning detection for dropped file 12->105 107 Checks if browser processes are running 12->107 109 2 other signatures 12->109 signatures5 process6 dnsIp7 59 www.wk1888.com 107.165.232.232, 2011, 8000 EGIHOSTINGUS United States 16->59 61 110.76.158.75, 11024, 49744 CHINATELECOM-CTCLOUDCloudComputingCorporationCN China 16->61 69 3 other IPs or domains 16->69 33 C:\Windows\XXXXXXE3539977\svchsot.exe, PE32 16->33 dropped 35 C:\Windows\SysWOW64\060358\svchost.exe, PE32 16->35 dropped 37 C:\Windows\SysWOW64\060358\RCX97D9.tmp, PE32 16->37 dropped 85 Antivirus detection for dropped file 16->85 87 Machine Learning detection for dropped file 16->87 89 Contains functionality to detect virtual machines (IN, VMware) 16->89 99 6 other signatures 16->99 23 svchost.exe 1 21 16->23         started        63 www.lang32.com 21->63 65 www.lang32.com 35.205.61.67 GOOGLEUS United States 21->65 67 110.76.158.13, 49745, 8848 CHINATELECOM-CTCLOUDCloudComputingCorporationCN China 21->67 39 C:\Windows\Temp\8848Diao.exe, PE32 21->39 dropped 41 C:\Users\user\AppData\...\8848Diao[1].exe, PE32 21->41 dropped 91 Multi AV Scanner detection for dropped file 21->91 93 Contains functionality to automate explorer (e.g. start an application) 21->93 95 Contains functionality to infect the boot sector 21->95 28 8848Diao.exe 1 3 21->28         started        file8 97 System process connects to network (likely due to code injection or exploit) 63->97 signatures9 process10 dnsIp11 71 www.wk1888.com 23->71 73 www.fz0575.com 23->73 75 www.af0575.com 23->75 47 C:\Windows\...\svchsot.exe, PE32 23->47 dropped 49 C:\Windows\SysWOW64\060405\svchost.exe, PE32 23->49 dropped 51 C:\Windows\SysWOW64\060405\RCX9802.tmp, PE32 23->51 dropped 111 Antivirus detection for dropped file 23->111 113 System process connects to network (likely due to code injection or exploit) 23->113 115 Multi AV Scanner detection for dropped file 23->115 123 6 other signatures 23->123 30 svchost.exe 23->30         started        53 C:\Users\user\AppData\Local\Temp\4d49f5.tmp, PE32 28->53 dropped 55 C:\Users\user\AppData\Local\Temp\4d47a2.tmp, PE32 28->55 dropped 57 C:\Users\user\AppData\Local\Temp\4d454f.tmp, PE32 28->57 dropped 117 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 28->117 119 Machine Learning detection for dropped file 28->119 121 Renames NTDLL to bypass HIPS 28->121 file12 signatures13 process14 signatures15 125 Antivirus detection for dropped file 30->125 127 Machine Learning detection for dropped file 30->127 129 Checks if browser processes are running 30->129 131 2 other signatures 30->131
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2021-12-30 22:49:00 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
34 of 43 (79.07%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Enumerates connected drives
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Unpacked files
SH256 hash:
728f6771a46f716c6f8183cfea703c34333f8f743a95aca2be9e24d4e6e92a22
MD5 hash:
7bef09c57eb8bf80b087c8c3db4e3dcb
SHA1 hash:
57b27ed1743be7e3532fbf78d6579944a414ae73
SH256 hash:
4def25bfde1457ef315ebfcf6523021223bbcf31fdfc3da68aba1d164818322f
MD5 hash:
ca1d49f98c9521e443f5163fcf17310b
SHA1 hash:
1adb42029997c8351df9d5760e4ad41563d64a13
SH256 hash:
b354b05263b4821f0e864d2f478c1f76cfd9d89f85bcc044e790bd5382ae201f
MD5 hash:
a2aa12e33f29dbed3149291eb997b07f
SHA1 hash:
b46903e5a32687029b37243e4650a40e73be338f
SH256 hash:
ae5f6a5007c02c48f4bba3dd694c528f500f8e12ec106661149e4a3d1f678c8d
MD5 hash:
aff7cf93b494c088fb991bebde49df9a
SHA1 hash:
e0f72ed2c9820f9c008979269282441de1b66f20
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:CN_disclosed_20180208_Mal1
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:CN_disclosed_20180208_Mal1_RID2F59
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:GhostDragon_Gh0stRAT_Sample3
Author:Florian Roth
Description:Detects Gh0st RAT mentioned in Cylance' Ghost Dragon Report
Reference:https://blog.cylance.com/the-ghost-dragon
Rule name:GhostDragon_Gh0stRAT_Sample3_RID3171
Author:Florian Roth
Description:Detects Gh0st RAT mentioned in Cylance' Ghost Dragon Report
Reference:https://blog.cylance.com/the-ghost-dragon
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP
Author:ditekSHen
Description:Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
Rule name:MALWARE_Win_Nitol
Author:ditekSHen
Description:Detects Nitol backdoor
Rule name:MALWARE_Win_PCRat
Author:ditekSHen
Description:Detects PCRat / Gh0st
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Redosdru

Executable exe ae5f6a5007c02c48f4bba3dd694c528f500f8e12ec106661149e4a3d1f678c8d

(this sample)

  
Delivery method
Distributed via web download

Comments