MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d520edc59c5aee94806782d012efa7e0f905e90ce4e177f14cd612e7b8bb17ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 10


Intelligence 10 IOCs 2 YARA 9 File information Comments

SHA256 hash: d520edc59c5aee94806782d012efa7e0f905e90ce4e177f14cd612e7b8bb17ba
SHA3-384 hash: 689617f6a5a74b16023c529fde99d775270583cf559816750905e58b2c92f63899d783ca290d57201a20b913e1b2aa30
SHA1 hash: 907c23a4e0aed6b887e0f7c8b16e1b4f82d1f340
MD5 hash: c061f6c696cde2214e0425839ae84f84
humanhash: idaho-avocado-nevada-september
File name:C061F6C696CDE2214E0425839AE84F84.exe
Download: download sample
Signature DiamondFox
File size:2'680'889 bytes
First seen:2021-07-25 13:40:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBxPkZVi7iKiF8cUvFyP2jckAjxt3htaPkvAesMMOZEwJ84vLRaBtIl9mT+Pep:xRri7ixZUvFyPScjVt4j/hCvLUBsKv
Threatray 230 similar samples on MalwareBazaar
TLSH T13AC53322BBD7C4FBDB551030AA483FB1F1FAC3285A25189B3744E71D5F348A4A439B5A
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
212.224.105.98:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
212.224.105.98:80 https://threatfox.abuse.ch/ioc/162766/
193.56.146.60:51431 https://threatfox.abuse.ch/ioc/162770/

Intelligence


File Origin
# of uploads :
1
# of downloads :
191
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C061F6C696CDE2214E0425839AE84F84.exe
Verdict:
No threats detected
Analysis date:
2021-07-25 13:44:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Moving a file to the %temp% subdirectory
Connection attempt
Sending a custom TCP request
DNS request
Running batch commands
Sending an HTTP GET request
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer Cookie Stealer RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Renames NTDLL to bypass HIPS
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Backstage Stealer
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 453901 Sample: niVlmfH0Cs.exe Startdate: 25/07/2021 Architecture: WINDOWS Score: 100 165 google.vrthcobj.com 2->165 237 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->237 239 Found malware configuration 2->239 241 Malicious sample detected (through community Yara rule) 2->241 243 18 other signatures 2->243 13 niVlmfH0Cs.exe 15 2->13         started        16 services64.exe 2->16         started        signatures3 process4 file5 149 C:\Users\user\AppData\...\setup_install.exe, PE32 13->149 dropped 151 C:\Users\user\AppData\Local\...\sahiba_2.txt, PE32 13->151 dropped 153 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32+ 13->153 dropped 155 10 other files (none is malicious) 13->155 dropped 19 setup_install.exe 1 13->19         started        199 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->199 201 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->201 signatures6 process7 dnsIp8 167 razino.xyz 192.64.119.193, 49716, 80 NAMECHEAP-NETUS United States 19->167 169 127.0.0.1 unknown unknown 19->169 245 Detected unpacking (changes PE section rights) 19->245 247 Performs DNS queries to domains with low reputation 19->247 23 cmd.exe 1 19->23         started        25 cmd.exe 1 19->25         started        27 cmd.exe 1 19->27         started        29 5 other processes 19->29 signatures9 process10 process11 31 sahiba_4.exe 14 5 23->31         started        36 sahiba_2.exe 1 25->36         started        38 sahiba_3.exe 89 27->38         started        40 sahiba_6.exe 29->40         started        42 sahiba_7.exe 29->42         started        44 sahiba_1.exe 2 29->44         started        46 sahiba_5.exe 3 29->46         started        dnsIp12 193 2 other IPs or domains 31->193 101 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 31->101 dropped 203 Detected unpacking (overwrites its own PE header) 31->203 48 LzmwAqmV.exe 31->48         started        103 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 36->103 dropped 205 DLL reload attack detected 36->205 207 Detected unpacking (changes PE section rights) 36->207 209 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->209 223 4 other signatures 36->223 51 explorer.exe 36->51 injected 195 2 other IPs or domains 38->195 105 C:\Users\user\AppData\...\softokn3[1].dll, PE32 38->105 dropped 107 C:\Users\user\AppData\...\freebl3[1].dll, PE32 38->107 dropped 109 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 38->109 dropped 117 9 other files (none is malicious) 38->117 dropped 211 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->211 213 Tries to harvest and steal browser information (history, passwords, etc) 38->213 215 Tries to steal Crypto Currency Wallets 38->215 55 cmd.exe 38->55         started        185 37.0.11.9, 49727, 80 WKD-ASIE Netherlands 40->185 187 37.0.8.235, 49721, 80 WKD-ASIE Netherlands 40->187 189 ipinfo.io 34.117.59.81, 443, 49719 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 40->189 217 May check the online IP address of the machine 40->217 219 Disable Windows Defender real time protection (registry) 40->219 197 3 other IPs or domains 42->197 111 C:\Users\user\AppData\Local\Temp\22222.exe, PE32 42->111 dropped 113 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 42->113 dropped 115 C:\Users\user\AppData\...\aaa_v004[1].dll, DOS 42->115 dropped 57 11111.exe 42->57         started        59 11111.exe 42->59         started        61 22222.exe 42->61         started        221 Creates processes via WMI 44->221 63 sahiba_1.exe 44->63         started        191 88.99.66.31 HETZNER-ASDE Germany 46->191 file13 signatures14 process15 dnsIp16 119 C:\Users\user\AppData\...\askinstall54.exe, PE32 48->119 dropped 121 C:\Users\user\AppData\...\OLKbrowser.exe, PE32 48->121 dropped 123 C:\Users\user\AppData\Local\Temp\3002.exe, PE32 48->123 dropped 135 2 other files (none is malicious) 48->135 dropped 65 Chrome2.exe 48->65         started        68 OLKbrowser.exe 48->68         started        71 jhuuee.exe 48->71         started        78 3 other processes 48->78 171 152.89.247.174 COMBAHTONcombahtonGmbHDE Germany 51->171 173 187.233.13.17 UninetSAdeCVMX Mexico 51->173 175 175.120.254.9 SKB-ASSKBroadbandCoLtdKR Korea Republic of 51->175 125 C:\Users\user\AppData\Roaming\ivgsvba, PE32 51->125 dropped 127 C:\Users\user\AppData\Local\Temp\7294.exe, PE32 51->127 dropped 249 System process connects to network (likely due to code injection or exploit) 51->249 251 Benign windows process drops PE files 51->251 253 Hides that the sample has been downloaded from the Internet (zone.identifier) 51->253 74 conhost.exe 55->74         started        129 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 63->129 dropped 131 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 63->131 dropped 133 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 63->133 dropped 76 conhost.exe 63->76         started        file17 signatures18 process19 dnsIp20 137 C:\Users\user\AppData\...\services64.exe, PE32+ 65->137 dropped 80 services64.exe 65->80         started        85 cmd.exe 65->85         started        255 Sample uses process hollowing technique 68->255 257 Injects a PE file into a foreign processes 68->257 87 conhost.exe 68->87         started        177 157.240.17.35 FACEBOOKUS United States 71->177 179 157.240.223.35 FACEBOOKUS United States 71->179 181 157.240.27.35 FACEBOOKUS United States 71->181 139 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 71->139 dropped 141 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 71->141 dropped 89 jfiag3g_gg.exe 71->89         started        183 144.202.76.47 AS-CHOOPAUS United States 78->183 259 Creates processes via WMI 78->259 91 3002.exe 78->91         started        93 conhost.exe 78->93         started        file21 signatures22 process23 dnsIp24 157 140.82.121.3 GITHUBUS United States 80->157 159 185.199.108.133 FASTLYUS Netherlands 80->159 161 185.65.135.248 ESAB-ASSE Sweden 80->161 143 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 80->143 dropped 145 C:\Users\user\AppData\...\sihost64.exe, PE32+ 80->145 dropped 225 Modifies the context of a thread in another process (thread injection) 80->225 227 Sample uses process hollowing technique 80->227 229 Sample is not signed and drops a device driver 80->229 231 Injects a PE file into a foreign processes 80->231 233 Uses schtasks.exe or at.exe to add and modify task schedules 85->233 95 conhost.exe 85->95         started        97 schtasks.exe 85->97         started        235 Tries to harvest and steal browser information (history, passwords, etc) 89->235 163 172.67.222.125 CLOUDFLARENETUS United States 91->163 147 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 91->147 dropped 99 conhost.exe 91->99         started        file25 signatures26 process27
Gathering data
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-07-21 06:44:20 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:raccoon family:redline family:smokeloader family:socelars family:vidar family:xmrig botnet:865 botnet:903 botnet:933 botnet:ani aspackv2 backdoor discovery dropper evasion infostealer loader miner persistence spyware stealer suricata themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Nirsoft
Vidar Stealer
XMRig Miner Payload
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
xmrig
Malware Config
C2 Extraction:
https://shpak125.tumblr.com/
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
yoshelona.xyz:80
Unpacked files
SH256 hash:
68ca42d0f61ab8eb65b27dcd8ed3ef2a46b53da2e5c1a5373cdc59b801dc7bca
MD5 hash:
be5801fddcd920fa741e011327ccc51a
SHA1 hash:
abb74bce4f7b09d5a79878549443586ae26444da
SH256 hash:
278b17331e86546245f56c8516e73ee4bfa415d9fbfa7e3cdd6954dfa163d66a
MD5 hash:
0e07fa6e85f4d68f832662d3dec6e2f0
SHA1 hash:
5dd39abb713e745e21f8d09f6c778b9d10be6ff0
SH256 hash:
5398e8eb8e6a381b8601645142fc0d746ea473ffb871b5ce577e69c5bedbb944
MD5 hash:
a4bfc0c482a924e5c80117914afef82b
SHA1 hash:
ad5c3aca5f4c4aabf8da1059ddbefa5d1f196e15
SH256 hash:
396adb904ebd81c2996a01520af921ef4bffedaf45b65d50d158e95a10c2b943
MD5 hash:
3338af5387be57396e2ab03cdd18271f
SHA1 hash:
e60e505a56fedd2f91e0ac4ec7267c270b86ebc3
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
c74894fe98864ade516c9e54f2258a23ed451feadfa2de53a7c626385b549b22
MD5 hash:
e44b6cb9e7111de178fbabf3ac1cba76
SHA1 hash:
b15d8d52864a548c42a331a574828824a65763ff
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
5b397fc6966368fc4b2c3302e0aa529d14de521a1ff2810a8145a7c574fa7709
MD5 hash:
4a958b7f15d342fbaaed26da7b9a5628
SHA1 hash:
25e663702193dc851e7fd57005ef45d9e65077f4
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
f051c8c9fa1df14467635a1988bce0810b813979200405de9973059569d35dd7
MD5 hash:
f809c50b80f2174789110a600b275b37
SHA1 hash:
20aa7fb314365ede1fbf5a25df1f29395abf1cd0
SH256 hash:
b435fe4ba26cc4b6c454d44daa5c6bd48e264f14fa93cd2e6de1d36ccf92f3cd
MD5 hash:
8774bc38d0c299242ef653bb03965ab5
SHA1 hash:
e1ac4084813648cd2c213aa5c714574ac655c48d
SH256 hash:
d520edc59c5aee94806782d012efa7e0f905e90ce4e177f14cd612e7b8bb17ba
MD5 hash:
c061f6c696cde2214e0425839ae84f84
SHA1 hash:
907c23a4e0aed6b887e0f7c8b16e1b4f82d1f340
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments