MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da362dff8b39c6b4b92387f48f5beb91ce55dbdf8bfe6a6ec7b5e6f1aa269010. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



N-W0rm


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 14 File information Comments

SHA256 hash: da362dff8b39c6b4b92387f48f5beb91ce55dbdf8bfe6a6ec7b5e6f1aa269010
SHA3-384 hash: 708cfa5cb3c8e7960c54d3633ee6960fb5f12a9ad46d86a080a60863ef45e8bc73bc16a6a682b244d9231330ff77f8d5
SHA1 hash: 137f6474629429208ee898a8ba3e306446b634a5
MD5 hash: 27f703cfffdc7c878e1e309d062375b1
humanhash: zebra-five-video-jersey
File name:DA362DFF8B39C6B4B92387F48F5BEB91CE55DBDF8BFE6.exe
Download: download sample
Signature N-W0rm
File size:2'154'285 bytes
First seen:2022-06-23 17:17:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (389 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 49152:fBaf6A1KmQ8s7bgCT2Ftsihs629xk19YckXLvb/kk:JAkNk7vo629m3YckXLvTkk
TLSH T1D8A523427BE0ACB3C1761935593DA615B93CBD201B60CADBF384BA9DDE720C0E732656
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9449cecc9c6879d8 (2 x Adware.Generic, 1 x N-W0rm, 1 x RedLineStealer)
Reporter abuse_ch
Tags:exe N-W0rm


Avatar
abuse_ch
N-W0rm C2:
193.142.146.212:4581

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.142.146.212:4581 https://threatfox.abuse.ch/ioc/716462/

Intelligence


File Origin
# of uploads :
1
# of downloads :
244
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Launching a process
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
DNS request
Sending a custom TCP request
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
anti-vm greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT, RedLine
Detection:
malicious
Classification:
troj.evad.spyw
Score:
82 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
Creates an undocumented autostart registry key
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 651288 Sample: DA362DFF8B39C6B4B92387F48F5... Startdate: 23/06/2022 Architecture: WINDOWS Score: 82 127 Malicious sample detected (through community Yara rule) 2->127 129 Multi AV Scanner detection for dropped file 2->129 131 Multi AV Scanner detection for submitted file 2->131 133 9 other signatures 2->133 9 DA362DFF8B39C6B4B92387F48F5BEB91CE55DBDF8BFE6.exe 10 2->9         started        12 uTorrent.exe 2->12         started        16 svchost.exe 2->16         started        18 11 other processes 2->18 process3 dnsIp4 63 C:\Users\user\AppData\Local\...\Setup.exe, PE32 9->63 dropped 65 C:\Users\user\AppData\Local\...\Patch.exe, PE32 9->65 dropped 20 Patch.exe 3 9->20         started        23 Setup.exe 9->23         started        107 5.18.177.86 ZTELECOM-ASRU Russian Federation 12->107 109 93.73.140.216 VOLIA-ASUA Ukraine 12->109 113 88 other IPs or domains 12->113 67 C:\Users\user\AppData\...\utorrentie.exe, PE32 12->67 dropped 69 C:\Users\user\AppData\...\3.5.5_46304.exe, PE32 12->69 dropped 71 C:\Users\...\MicrosoftEdgeWebView2Setup.exe, PE32 12->71 dropped 161 Tries to detect sandboxes / dynamic malware analysis system (registry check) 12->161 163 Changes security center settings (notifications, updates, antivirus, firewall) 16->163 26 MpCmdRun.exe 16->26         started        111 8.8.8.8 GOOGLEUS United States 18->111 28 WerFault.exe 18->28         started        file5 signatures6 process7 file8 135 Antivirus detection for dropped file 20->135 137 Multi AV Scanner detection for dropped file 20->137 139 Machine Learning detection for dropped file 20->139 143 3 other signatures 20->143 30 RegAsm.exe 15 9 20->30         started        61 C:\Users\user\AppData\Local\...\Setup.tmp, PE32 23->61 dropped 141 Obfuscated command line found 23->141 34 Setup.tmp 23->34         started        36 conhost.exe 26->36         started        signatures9 process10 dnsIp11 115 162.159.133.233 CLOUDFLARENETUS United States 30->115 117 185.150.117.206 CHERRYSERVERS1-ASLT Lithuania 30->117 91 C:\Users\user\...\WindowsServicesGreat.exe, PE32+ 30->91 dropped 93 C:\Users\user\...\WindowsServicesFix.exe, PE32 30->93 dropped 95 C:\Users\user\...\WindowsServicesDone.exe, PE32 30->95 dropped 97 C:\Users\user\AppData\...\WindowsServices.exe, PE32 30->97 dropped 38 WindowsServices.exe 30->38         started        41 WindowsServicesFix.exe 30->41         started        44 WindowsServicesDone.exe 30->44         started        55 2 other processes 30->55 119 13.226.150.82 AMAZON-02US United States 34->119 121 13.226.175.84 AMAZON-02US United States 34->121 123 4 other IPs or domains 34->123 99 C:\Users\user\AppData\...\uTorrent.exe (copy), PE32 34->99 dropped 101 C:\Users\...\avast_secure_browser_setup.exe, PE32 34->101 dropped 103 C:\Users\user\AppData\Local\...\is-LIHB6.tmp, PE32 34->103 dropped 105 4 other files (none is malicious) 34->105 dropped 46 avast_secure_browser_setup.exe 34->46         started        49 prod0.exe 34->49         started        51 uTorrent.exe 34->51         started        53 uTorrent.exe 34->53         started        file12 process13 dnsIp14 145 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 38->145 147 Writes to foreign memory regions 38->147 149 Injects a PE file into a foreign processes 38->149 57 RegAsm.exe 38->57         started        73 C:\Users\user\AppData\...\LANCheckerMe.exe, PE32 41->73 dropped 151 Creates an undocumented autostart registry key 41->151 75 C:\Users\user\AppData\...\LANCheckerMe2.exe, PE32 44->75 dropped 59 RegAsm.exe 44->59         started        125 104.22.39.247 CLOUDFLARENETUS United States 46->125 87 13 other files (none is malicious) 46->87 dropped 153 Query firmware table information (likely to detect VMs) 46->153 155 Tries to harvest and steal browser information (history, passwords, etc) 46->155 157 Checks if the current machine is a virtual machine (disk enumeration) 46->157 77 C:\Users\user\AppData\Local\...\rsStubLib.dll, PE32 49->77 dropped 79 C:\Users\user\AppData\Local\...\rsLogger.dll, PE32 49->79 dropped 81 C:\Users\user\...\RavStub.resources.dll, PE32 49->81 dropped 89 33 other files (none is malicious) 49->89 dropped 83 C:\Users\user\AppData\...\uTorrent.exe, PE32 51->83 dropped 159 Tries to detect sandboxes / dynamic malware analysis system (registry check) 51->159 85 C:\Users\user\AppData\...\LANCheckerMe3.exe, PE32+ 55->85 dropped file15 signatures16 process17
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2022-05-02 13:25:30 UTC
File Type:
PE (Exe)
Extracted files:
58
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
redline
Score:
  10/10
Tags:
family:asyncrat family:redline botnet:1337x botnet:4444 --- 1337x ---- 4444 discovery infostealer persistence rat spyware stealer suricata
Behaviour
Modifies system certificate store
Script User-Agent
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Async RAT payload
AsyncRat
Modifies WinLogon for persistence
RedLine
RedLine Payload
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
Malware Config
C2 Extraction:
amrican-sport-live-stream.cc:4581
Unpacked files
SH256 hash:
3ed9ed1fc1164291e0bd8fd8fb7c030e6a93b1d2bad877d18ab6e8be2b8f6ac9
MD5 hash:
64b11f1721ff9c04d5b3789bfd5eef4b
SHA1 hash:
5198f295b2398ff5980acfd48a748c1d793ed93d
SH256 hash:
00e9d0566fa80a8cb310666084b015ae52fa1e98d2033948fb05f227ff2e8fc5
MD5 hash:
66ec77ac423e84bd58cb2a1b7dc1b031
SHA1 hash:
c6f2f088aa65280066ac2da8c2102bf13e8c0b54
SH256 hash:
d9281102a487abc8d555e8520f79cee014290389c54b2748de4fa466201e0107
MD5 hash:
6ae5dc9c84646c25820f4a1257b74b83
SHA1 hash:
83224b62caa9831787444413a97d5e0c1a2908ec
SH256 hash:
da362dff8b39c6b4b92387f48f5beb91ce55dbdf8bfe6a6ec7b5e6f1aa269010
MD5 hash:
27f703cfffdc7c878e1e309d062375b1
SHA1 hash:
137f6474629429208ee898a8ba3e306446b634a5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AsyncRat
Author:kevoreilly, JPCERT/CC Incident Response Group
Description:AsyncRat Payload
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:malware_asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_AsnycRAT
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_AsyncRAT_Config_Decryption
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:SUSP_Reverse_Run_Key
Author:SECUINFRA Falcon Team
Description:Detects a Reversed Run Key
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments