MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Spambot.Kelihos
Vendor detections: 11
| SHA256 hash: | c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19 |
|---|---|
| SHA3-384 hash: | 8c5a3844b54bd9979cd73061af3805eb9bce75af374d5e15ead589b1d8c8faf9e20dc7ba71603ec5683f244d32ccdf44 |
| SHA1 hash: | 5a96fd55be61222b3e6438712979dc2a18a50b8c |
| MD5 hash: | 1b5154bc65145adba0a58e964265d5f2 |
| humanhash: | paris-november-william-victor |
| File name: | setup_x86_x64_install.exe |
| Download: | download sample |
| Signature | Spambot.Kelihos |
| File size: | 3'687'729 bytes |
| First seen: | 2021-09-12 07:14:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 98304:yYMbU5ude0du2SMsVH6J2nk0u740DLjwi+QREqiIe:yYDU7sl/nbuxDHwi+QRpiIe |
| Threatray | 546 similar samples on MalwareBazaar |
| TLSH | T13B063392D9A68F27D8A10AF0FD3B8D6A6CE1916905105FA7E1BD436C2FC78866D0D0D3 |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | exe Spambot.Kelihos |
Intelligence
File Origin
# of uploads :
1
# of downloads :
209
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
No threats detected
Analysis date:
2021-09-12 07:17:18 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
RedLine
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
overlay packed
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-12 07:15:11 UTC
AV detection:
24 of 40 (60.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 536 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pab123 botnet:uts aspackv2 backdoor evasion infostealer persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Adds Run key to start application
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
45.14.49.169:22411
https://gheorghip.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.9.20.20:13441
https://gheorghip.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.9.20.20:13441
Dropper Extraction:
http://shellloader.com/welcome
Unpacked files
SH256 hash:
38046382500f1739883d2c53639ffbc5756843da7574fe3e6820724f522958e2
MD5 hash:
33600475b2cc5445df2d3809c3798311
SHA1 hash:
3cb60432de30b82e87b8b607e0180a7843128b5a
Parent samples :
aa79b859945459fd6d1363c35e68c9d2674a78f1fdee02b8ddfab9a8fa011b48
e96f083ab18199d6a745b0fb3a8852b863b94a906664570198c8277abe4195c6
a412840c44db8bca039ce13176d7d6b9be9b2cbd1ef81eb85cd2f0c9180f6511
bf9714f60c2b4b43cc0383b3155d9c737271916032051df041fed54d34f7c765
2c3382e9eb5bbbfe86a88f9d8a75557c3f60707af088ce5f1283ee7a33cc3fbf
a3f0b643265e9895b3291658516ce2b34eb06d585bd8ea77fd61fda26917e0d9
5c97c35e6537283493bbfcd8fa178157898e6d266a36eadb9ab23bbcef613efc
e96f083ab18199d6a745b0fb3a8852b863b94a906664570198c8277abe4195c6
a412840c44db8bca039ce13176d7d6b9be9b2cbd1ef81eb85cd2f0c9180f6511
bf9714f60c2b4b43cc0383b3155d9c737271916032051df041fed54d34f7c765
2c3382e9eb5bbbfe86a88f9d8a75557c3f60707af088ce5f1283ee7a33cc3fbf
a3f0b643265e9895b3291658516ce2b34eb06d585bd8ea77fd61fda26917e0d9
5c97c35e6537283493bbfcd8fa178157898e6d266a36eadb9ab23bbcef613efc
SH256 hash:
0fd897b1e74f50e47526f974bf4906ecbe4a331b1ae4e2ec309fbee57a032586
MD5 hash:
4c3423a6e5e3337c71c551358f1334c1
SHA1 hash:
e3f59c4781ab6b19adb9eb85054a060b34c3df73
SH256 hash:
be466c036bbcec6936d2b2f51d530c89b592c6624fb839914d98ee9c935671b7
MD5 hash:
86bfea0cf31c782163dce5387419a19b
SHA1 hash:
d24a2e9fd57014cc5bb0b4089012847807dd6016
SH256 hash:
c02d2c9ae0b587f9b7631c443ce5a7d6d409c0a5d09ff6b389ca1330d44a1149
MD5 hash:
a91a81780273bb279790c1fbb6fb3105
SHA1 hash:
4bedae163300009aac8afa2c2b42ea6c184ca9dd
SH256 hash:
17c6394f4256e6ec014b98d078dcfae89bfff431bb5fd17e95d5858b50ca1659
MD5 hash:
2927aaa5f942c2fb3f781d0ed30fb6ab
SHA1 hash:
19c566defbc40d60e909cd4635a840a042b119b3
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
c034ee0ed45c8278cf10e330a92220f7d33c2d3d10f2721c2acabcca552b6423
MD5 hash:
4df600c45dbfd49fa9e31134e8f47434
SHA1 hash:
f07d4411a7b3722206e9d17e94749819930cedcb
SH256 hash:
f407f211cecadec19b03c343e3ed232e7e6ae248a63dcf279c076049d0072f1d
MD5 hash:
c4e44db9329a4d99e08b140e23288a32
SHA1 hash:
c141953f308187745a326fadd07836d505039b9e
SH256 hash:
769c1a737230bf4de7cc12cdaa85e051571766362e7b2ab3b94652f9c4e84aaa
MD5 hash:
6bfbeeb0a3bcae34afb63802287db7d7
SHA1 hash:
88c0815ca0f4bfe850980a05927e4abd0b470a0b
SH256 hash:
21103f8445399fb1b3a5fe665cfd221d38066b09fa1e2a2d2ca59c09db95052a
MD5 hash:
6f4e3451cd8c385c87fd76feab15bb6e
SHA1 hash:
861c46d7211a572b756df462eec43c58aeec85f4
SH256 hash:
4a42d437f69f739b1ac50f886c28fcdadfe2d90972707cda29716452176224e7
MD5 hash:
c50582254893c879d73409eaa57da233
SHA1 hash:
11e10fd89fe1b4715c5479638c1c3444e99f1b3b
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
becee4367b9026e2c5c0fd995d0c34744ee9e46e40ad99dc45dfd8076f82c7ad
MD5 hash:
23981e89b000b9030183313b42e989f3
SHA1 hash:
a9fa17c161c76b7da823034bd68ba16a65341fc3
SH256 hash:
cc75c5cedc3f381fef7898603d8a3dcbcb5e00f109d8d202dab3a26e2db5b7fc
MD5 hash:
8c3fb05e5387b3c063dcab3b752fa02f
SHA1 hash:
6f9be1d696ecd4924f2f9fbde28d0ee767692703
SH256 hash:
df34893b8e5fa9edb4ac2181d864621e5aa6797ee6b2a30b006d4bbedfbe21bb
MD5 hash:
ece4b1e09745cb245740c8a0144bc89d
SHA1 hash:
58b95a3aea083108e7394e9d44b0cf431da50744
SH256 hash:
12988df912dee433d374f26a54bd73d948d73f49de63c0686679c63836ea4a47
MD5 hash:
ee197fbb5a56046fe20bfe667fd800f4
SHA1 hash:
6e00870e3d35c019339697a6f6babb11581e61cb
SH256 hash:
83d302e7e37ea1d4e42b02c79553916ab3f2b397bca8a426f751af60d58f7611
MD5 hash:
e747ffaac72dc53dc6c31607eb7e8b29
SHA1 hash:
18ba1efdd7c4a110e75fd2bac1ac7df3ba77bb37
Detections:
win_socelars_auto
SH256 hash:
0f4cbc9fca4ed8ebedc1a9f9491e676ceaa0c1624a9a2e412f25d261ac09753b
MD5 hash:
6d76fb1a740f8da2a572e73d852dcef4
SHA1 hash:
62e223603c5122c5456de44c317ceb208b21c047
SH256 hash:
46b3fa7684d9cc4baa0f3091f66e82bea31d0267e7382a236fdb3b7b9cd86987
MD5 hash:
5525e5cdd1dc2a28d056e96c4ca70acd
SHA1 hash:
f8c57e22a956305109a36dacd8e8a230bd1101a8
SH256 hash:
c48cd55efee57f0b7ff4547a0a20ebfbdf4188d059512b10a29879bf30c4fc19
MD5 hash:
1b5154bc65145adba0a58e964265d5f2
SHA1 hash:
5a96fd55be61222b3e6438712979dc2a18a50b8c
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.