MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d74a07eeb26faeed4799f582bcb3c22ba985cc7bf21685d3b6e37aa694a72d97. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 8


Intelligence 8 IOCs 2 YARA 8 File information Comments

SHA256 hash: d74a07eeb26faeed4799f582bcb3c22ba985cc7bf21685d3b6e37aa694a72d97
SHA3-384 hash: 9652ec437b9c2061ff51fed99992e64570d6513beb5563df20fef170f7e8fc7492bef4128dd66cd2ae6a84b205012920
SHA1 hash: 0e6b17c5c3dcab55697b4589e8a239961fac9ed0
MD5 hash: 2a0a05bcae0114f543206ed1a81a8c69
humanhash: vegan-freddie-cold-ack
File name:2A0A05BCAE0114F543206ED1A81A8C69.exe
Download: download sample
Signature DiamondFox
File size:1'582'919 bytes
First seen:2021-07-31 19:05:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBECpZgu2Wk+EwJ84vLRaBtIl9mTXcRjt0S:xaZ2WOCvLUBsKsFt0S
Threatray 250 similar samples on MalwareBazaar
TLSH T11D7523717BE1C5B9D5406131AA8C2F7250FDC35E0B3116EB77D4C70EAF3C8929226A6A
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox C2:
213.166.68.170:16810

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
213.166.68.170:16810 https://threatfox.abuse.ch/ioc/165167/
176.57.69.178:59510 https://threatfox.abuse.ch/ioc/165172/

Intelligence


File Origin
# of uploads :
1
# of downloads :
364
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2A0A05BCAE0114F543206ED1A81A8C69.exe
Verdict:
No threats detected
Analysis date:
2021-07-31 19:08:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer Glupteba RedLine Smoke
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Performs DNS TXT record lookups
Renames NTDLL to bypass HIPS
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Backstage Stealer
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 457369 Sample: puzlXYxqKK.exe Startdate: 31/07/2021 Architecture: WINDOWS Score: 100 84 iplogger.org 88.99.66.31 HETZNER-ASDE Germany 2->84 86 www3.l.google.com 142.250.203.110 GOOGLEUS United States 2->86 88 30 other IPs or domains 2->88 130 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->130 132 Multi AV Scanner detection for domain / URL 2->132 134 Antivirus detection for URL or domain 2->134 136 22 other signatures 2->136 10 puzlXYxqKK.exe 10 2->10         started        signatures3 process4 file5 72 C:\Users\user\AppData\...\setup_install.exe, PE32 10->72 dropped 74 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 10->74 dropped 76 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 10->76 dropped 78 5 other files (none is malicious) 10->78 dropped 13 setup_install.exe 1 10->13         started        process6 dnsIp7 96 marisana.xyz 104.21.19.116, 49718, 80 CLOUDFLARENETUS United States 13->96 98 127.0.0.1 unknown unknown 13->98 80 C:\Users\user\...\karotima_2.exe (copy), PE32 13->80 dropped 82 C:\Users\user\...\karotima_1.exe (copy), PE32 13->82 dropped 156 Detected unpacking (changes PE section rights) 13->156 158 Performs DNS queries to domains with low reputation 13->158 18 cmd.exe 1 13->18         started        20 cmd.exe 1 13->20         started        22 conhost.exe 13->22         started        file8 signatures9 process10 process11 24 karotima_1.exe 4 62 18->24         started        29 karotima_2.exe 1 20->29         started        dnsIp12 90 www.gzsfgjj.com 24->90 92 37.0.11.9, 49724, 80 WKD-ASIE Netherlands 24->92 94 10 other IPs or domains 24->94 62 C:\Users\...\zszC5NthghSzUaflrtXu_djP.exe, PE32 24->62 dropped 64 C:\Users\...\uPXo5UUS0DhDeL0B_RTUS9FR.exe, PE32 24->64 dropped 66 C:\Users\...\qeQxzO5aGRvaCItSK6Jh4mDd.exe, PE32 24->66 dropped 70 39 other files (30 malicious) 24->70 dropped 138 Drops PE files to the document folder of the user 24->138 140 May check the online IP address of the machine 24->140 142 Creates HTML files with .exe extension (expired dropper behavior) 24->142 144 Disable Windows Defender real time protection (registry) 24->144 31 6bYk2YuJIEtEnW1IhBLYlSGy.exe 24->31         started        36 5xpahP8TyQca6nuuFjsM9rfw.exe 15 6 24->36         started        38 1SZoqrglnMW0bLkqkGUebctz.exe 24->38         started        42 3 other processes 24->42 68 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 29->68 dropped 146 DLL reload attack detected 29->146 148 Renames NTDLL to bypass HIPS 29->148 150 Maps a DLL or memory area into another process 29->150 152 Checks if the current machine is a virtual machine (disk enumeration) 29->152 40 explorer.exe 8 12 29->40 injected file13 154 Performs DNS queries to domains with low reputation 90->154 signatures14 process15 dnsIp16 100 116.202.183.50 HETZNER-ASDE Germany 31->100 110 2 other IPs or domains 31->110 44 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 31->44 dropped 46 C:\Users\user\AppData\...\freebl3[1].dll, PE32 31->46 dropped 60 10 other files (none is malicious) 31->60 dropped 114 Detected unpacking (changes PE section rights) 31->114 116 Detected unpacking (overwrites its own PE header) 31->116 118 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 31->118 128 2 other signatures 31->128 102 music-sec.xyz 172.67.190.140 CLOUDFLARENETUS United States 36->102 104 iplogger.org 36->104 48 C:\Users\user\AppData\Roaming\6740353.exe, PE32 36->48 dropped 50 C:\Users\user\AppData\Roaming\4454817.exe, PE32 36->50 dropped 52 C:\Users\user\AppData\Roaming\4289249.exe, PE32 36->52 dropped 120 May check the online IP address of the machine 36->120 122 Performs DNS queries to domains with low reputation 36->122 124 Contains functionality to inject code into remote processes 38->124 126 Injects a PE file into a foreign processes 38->126 106 95.181.179.21 NEOHOST-ASUA Russian Federation 42->106 108 ip-api.com 208.95.112.1 TUT-ASUS United States 42->108 112 3 other IPs or domains 42->112 54 C:\Users\user\AppData\Local\Temp\22222.exe, PE32 42->54 dropped 56 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 42->56 dropped 58 C:\Users\user\AppData\...\aaa_v008[1].dll, DOS 42->58 dropped file17 signatures18
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-07-30 04:21:00 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:socelars family:vidar botnet:3 botnet:903 botnet:921 botnet:937 aspackv2 backdoor discovery dropper evasion infostealer loader persistence spyware stealer suricata themida trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
213.166.68.170:16810
https://xeronxikxxx.tumblr.com/
Unpacked files
SH256 hash:
eee4dfb10d2e336f82456ad0ea8aa618f4d6698168f46e84b5d576f661a94876
MD5 hash:
1a6ca151ea8ad459a0967f0f5443c9c7
SHA1 hash:
7ca5629f508191d4c19ff72cabd15dbda7e802b7
SH256 hash:
c9d5525b2f2b76087121039ee1c23ed35508e60f653479722ec64ea3a064878e
MD5 hash:
9108ad5775c76cccbb4eadf02de24f5d
SHA1 hash:
82996bc4f72b3234536d0b58630d5d26bcf904b0
SH256 hash:
1c83bfcca6d10cdb603db804212d2ff60a478cbdd3c8547636e733a1e2bae28d
MD5 hash:
2adf1986be67af56f5bfe1b9b857bdaa
SHA1 hash:
4336779d7127ea074a561632bc838b94e460a0f1
SH256 hash:
749a15c9618b31ec7ea0a38d8b9aff1ac2c84f641425edf801afc9bdeebbd6a4
MD5 hash:
8ce68237c1496f28752d90fe719eadc9
SHA1 hash:
6b0b4bba2f1fdc2c9a6645ca54a50583f970452c
SH256 hash:
d74a07eeb26faeed4799f582bcb3c22ba985cc7bf21685d3b6e37aa694a72d97
MD5 hash:
2a0a05bcae0114f543206ed1a81a8c69
SHA1 hash:
0e6b17c5c3dcab55697b4589e8a239961fac9ed0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments