MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Spambot.Kelihos


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19
SHA3-384 hash: 8c5a3844b54bd9979cd73061af3805eb9bce75af374d5e15ead589b1d8c8faf9e20dc7ba71603ec5683f244d32ccdf44
SHA1 hash: 5a96fd55be61222b3e6438712979dc2a18a50b8c
MD5 hash: 1b5154bc65145adba0a58e964265d5f2
humanhash: paris-november-william-victor
File name:setup_x86_x64_install.exe
Download: download sample
Signature Spambot.Kelihos
File size:3'687'729 bytes
First seen:2021-09-12 07:14:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yYMbU5ude0du2SMsVH6J2nk0u740DLjwi+QREqiIe:yYDU7sl/nbuxDHwi+QRpiIe
Threatray 546 similar samples on MalwareBazaar
TLSH T13B063392D9A68F27D8A10AF0FD3B8D6A6CE1916905105FA7E1BD436C2FC78866D0D0D3
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter Anonymous
Tags:exe Spambot.Kelihos

Intelligence


File Origin
# of uploads :
1
# of downloads :
209
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
No threats detected
Analysis date:
2021-09-12 07:17:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 481753 Sample: setup_x86_x64_install.exe Startdate: 12/09/2021 Architecture: WINDOWS Score: 100 105 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->105 107 104.21.17.186 CLOUDFLARENETUS United States 2->107 109 3 other IPs or domains 2->109 139 Multi AV Scanner detection for domain / URL 2->139 141 Antivirus detection for URL or domain 2->141 143 Multi AV Scanner detection for dropped file 2->143 145 12 other signatures 2->145 11 setup_x86_x64_install.exe 10 2->11         started        14 svchost.exe 1 2->14         started        signatures3 process4 file5 87 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->87 dropped 16 setup_installer.exe 18 11->16         started        process6 file7 53 C:\Users\user\AppData\...\setup_install.exe, PE32 16->53 dropped 55 C:\Users\user\...\Sun05fa3b4d2ae56e.exe, PE32 16->55 dropped 57 C:\Users\user\...\Sun05d60bc3b96248e5.exe, PE32 16->57 dropped 59 13 other files (8 malicious) 16->59 dropped 19 setup_install.exe 1 16->19         started        process8 dnsIp9 111 8.8.8.8 GOOGLEUS United States 19->111 113 172.67.142.91 CLOUDFLARENETUS United States 19->113 115 127.0.0.1 unknown unknown 19->115 147 Adds a directory exclusion to Windows Defender 19->147 23 cmd.exe 1 19->23         started        25 cmd.exe 19->25         started        27 cmd.exe 1 19->27         started        29 9 other processes 19->29 signatures10 process11 signatures12 32 Sun05ac1b0207d3ff3b8.exe 71 23->32         started        37 Sun050462125c7d35.exe 25->37         started        39 Sun05532f7abc.exe 27->39         started        149 Adds a directory exclusion to Windows Defender 29->149 41 Sun059375dac544fc4a.exe 29->41         started        43 Sun05fa3b4d2ae56e.exe 29->43         started        45 Sun054fe19a12cb3.exe 29->45         started        47 5 other processes 29->47 process13 dnsIp14 99 2 other IPs or domains 32->99 77 12 other files (none is malicious) 32->77 dropped 117 Detected unpacking (changes PE section rights) 32->117 119 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->119 121 Machine Learning detection for dropped file 32->121 123 Tries to steal Crypto Currency Wallets 32->123 89 104.21.37.182 CLOUDFLARENETUS United States 37->89 61 C:\ProgramData\7983102.exe, PE32 37->61 dropped 63 C:\ProgramData\7314360.exe, PE32 37->63 dropped 65 C:\ProgramData\6626888.exe, PE32 37->65 dropped 67 C:\ProgramData\2218388.exe, PE32 37->67 dropped 125 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 39->125 127 Maps a DLL or memory area into another process 39->127 129 Checks if the current machine is a virtual machine (disk enumeration) 39->129 91 162.159.133.233 CLOUDFLARENETUS United States 41->91 69 C:\Users\user\...\Sun059375dac544fc4a.exe.log, ASCII 41->69 dropped 71 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 41->71 dropped 131 Antivirus detection for dropped file 41->131 93 46.8.29.181 TEAM-HOSTASRU Russian Federation 43->93 133 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 43->133 73 C:\Users\user\...\Sun054fe19a12cb3.tmp, PE32 45->73 dropped 49 Sun054fe19a12cb3.tmp 45->49         started        95 208.95.112.1 TUT-ASUS United States 47->95 97 45.14.49.169 ITGLOBAL-NL Netherlands 47->97 101 5 other IPs or domains 47->101 75 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 47->75 dropped 135 Tries to harvest and steal browser information (history, passwords, etc) 47->135 137 Creates processes via WMI 47->137 file15 signatures16 process17 dnsIp18 103 162.0.213.132 ACPCA Canada 49->103 79 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 49->79 dropped 81 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 49->81 dropped 83 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 49->83 dropped 85 C:\Users\user\AppData\...\46807GHF____.exe, PE32 49->85 dropped file19
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-12 07:15:11 UTC
AV detection:
24 of 40 (60.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pab123 botnet:uts aspackv2 backdoor evasion infostealer persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Adds Run key to start application
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
45.14.49.169:22411
https://gheorghip.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.9.20.20:13441
Dropper Extraction:
http://shellloader.com/welcome
Unpacked files
SH256 hash:
0fd897b1e74f50e47526f974bf4906ecbe4a331b1ae4e2ec309fbee57a032586
MD5 hash:
4c3423a6e5e3337c71c551358f1334c1
SHA1 hash:
e3f59c4781ab6b19adb9eb85054a060b34c3df73
SH256 hash:
be466c036bbcec6936d2b2f51d530c89b592c6624fb839914d98ee9c935671b7
MD5 hash:
86bfea0cf31c782163dce5387419a19b
SHA1 hash:
d24a2e9fd57014cc5bb0b4089012847807dd6016
SH256 hash:
c02d2c9ae0b587f9b7631c443ce5a7d6d409c0a5d09ff6b389ca1330d44a1149
MD5 hash:
a91a81780273bb279790c1fbb6fb3105
SHA1 hash:
4bedae163300009aac8afa2c2b42ea6c184ca9dd
SH256 hash:
17c6394f4256e6ec014b98d078dcfae89bfff431bb5fd17e95d5858b50ca1659
MD5 hash:
2927aaa5f942c2fb3f781d0ed30fb6ab
SHA1 hash:
19c566defbc40d60e909cd4635a840a042b119b3
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
c034ee0ed45c8278cf10e330a92220f7d33c2d3d10f2721c2acabcca552b6423
MD5 hash:
4df600c45dbfd49fa9e31134e8f47434
SHA1 hash:
f07d4411a7b3722206e9d17e94749819930cedcb
SH256 hash:
f407f211cecadec19b03c343e3ed232e7e6ae248a63dcf279c076049d0072f1d
MD5 hash:
c4e44db9329a4d99e08b140e23288a32
SHA1 hash:
c141953f308187745a326fadd07836d505039b9e
SH256 hash:
769c1a737230bf4de7cc12cdaa85e051571766362e7b2ab3b94652f9c4e84aaa
MD5 hash:
6bfbeeb0a3bcae34afb63802287db7d7
SHA1 hash:
88c0815ca0f4bfe850980a05927e4abd0b470a0b
SH256 hash:
21103f8445399fb1b3a5fe665cfd221d38066b09fa1e2a2d2ca59c09db95052a
MD5 hash:
6f4e3451cd8c385c87fd76feab15bb6e
SHA1 hash:
861c46d7211a572b756df462eec43c58aeec85f4
SH256 hash:
4a42d437f69f739b1ac50f886c28fcdadfe2d90972707cda29716452176224e7
MD5 hash:
c50582254893c879d73409eaa57da233
SHA1 hash:
11e10fd89fe1b4715c5479638c1c3444e99f1b3b
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
becee4367b9026e2c5c0fd995d0c34744ee9e46e40ad99dc45dfd8076f82c7ad
MD5 hash:
23981e89b000b9030183313b42e989f3
SHA1 hash:
a9fa17c161c76b7da823034bd68ba16a65341fc3
SH256 hash:
cc75c5cedc3f381fef7898603d8a3dcbcb5e00f109d8d202dab3a26e2db5b7fc
MD5 hash:
8c3fb05e5387b3c063dcab3b752fa02f
SHA1 hash:
6f9be1d696ecd4924f2f9fbde28d0ee767692703
SH256 hash:
df34893b8e5fa9edb4ac2181d864621e5aa6797ee6b2a30b006d4bbedfbe21bb
MD5 hash:
ece4b1e09745cb245740c8a0144bc89d
SHA1 hash:
58b95a3aea083108e7394e9d44b0cf431da50744
SH256 hash:
12988df912dee433d374f26a54bd73d948d73f49de63c0686679c63836ea4a47
MD5 hash:
ee197fbb5a56046fe20bfe667fd800f4
SHA1 hash:
6e00870e3d35c019339697a6f6babb11581e61cb
SH256 hash:
83d302e7e37ea1d4e42b02c79553916ab3f2b397bca8a426f751af60d58f7611
MD5 hash:
e747ffaac72dc53dc6c31607eb7e8b29
SHA1 hash:
18ba1efdd7c4a110e75fd2bac1ac7df3ba77bb37
Detections:
win_socelars_auto
SH256 hash:
0f4cbc9fca4ed8ebedc1a9f9491e676ceaa0c1624a9a2e412f25d261ac09753b
MD5 hash:
6d76fb1a740f8da2a572e73d852dcef4
SHA1 hash:
62e223603c5122c5456de44c317ceb208b21c047
SH256 hash:
46b3fa7684d9cc4baa0f3091f66e82bea31d0267e7382a236fdb3b7b9cd86987
MD5 hash:
5525e5cdd1dc2a28d056e96c4ca70acd
SHA1 hash:
f8c57e22a956305109a36dacd8e8a230bd1101a8
SH256 hash:
c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19
MD5 hash:
1b5154bc65145adba0a58e964265d5f2
SHA1 hash:
5a96fd55be61222b3e6438712979dc2a18a50b8c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments