MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e00ddba4fd34c7b0f0f2e547ee9e3ff4c0cb4d906f1ca26b17ba2e3f459c59bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 12


Intelligence 12 IOCs 5 YARA 1 File information Comments

SHA256 hash: e00ddba4fd34c7b0f0f2e547ee9e3ff4c0cb4d906f1ca26b17ba2e3f459c59bd
SHA3-384 hash: 08f8bb32ba72e5a9ad566789274dccc9fdfcef69eaf57bfa916dc2954a2990521b9af2a6c2c1e2bb44a999405e5683e3
SHA1 hash: 99a56513362f72bd48a6f778b5ca81a02c5a559a
MD5 hash: f03218d975c871ace950a3e3a445a60f
humanhash: connecticut-bulldog-juliet-maine
File name:f03218d975c871ace950a3e3a445a60f.exe
Download: download sample
Signature Tofsee
File size:231'936 bytes
First seen:2022-02-04 21:35:26 UTC
Last seen:2022-02-04 23:50:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 80391c22607aed1d80054fa8f54c6b62 (1 x Tofsee, 1 x RedLineStealer)
ssdeep 6144:qpYnWmOXdg8LXVeZ5YBREaxtAznnNKaiNuIYhcr0:YYkg8LXe5YBqaxUiNuIYK
Threatray 2'111 similar samples on MalwareBazaar
TLSH T14E346C35B750F466E4B2043A749E83F698297E30375184EBB3D26F29AA342D2D734B17
File icon (PE):PE icon
dhash icon 92aae8c8e8f2b29a (3 x RedLineStealer, 2 x GCleaner, 2 x PrivateLoader)
Reporter abuse_ch
Tags:exe Tofsee


Avatar
abuse_ch
Tofsee C2:
http://2.56.59.26/dima/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://2.56.59.26/dima/index.php https://threatfox.abuse.ch/ioc/379269/
5.188.168.132:80 https://threatfox.abuse.ch/ioc/379316/
109.107.181.110:34060 https://threatfox.abuse.ch/ioc/379317/
193.106.191.100:5112 https://threatfox.abuse.ch/ioc/379318/
194.127.178.245:31789 https://threatfox.abuse.ch/ioc/378396/

Intelligence


File Origin
# of uploads :
2
# of downloads :
665
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f03218d975c871ace950a3e3a445a60f.exe
Verdict:
No threats detected
Analysis date:
2022-02-04 21:43:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a window
Launching a process
Running batch commands
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Blocking the Windows Defender launch
Unauthorized injection to a recently created process
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine Tofsee Vidar onlyLogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Gathering data
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2022-02-03 01:21:10 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
22 of 43 (51.16%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:onlylogger family:raccoon family:redline family:tofsee family:vidar family:xmrig botnet:97440559aa600fdf11b5d973d306af5470f07592 botnet:new discovery evasion infostealer loader miner persistence spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
OnlyLogger Payload
Vidar Stealer
XMRig Miner Payload
Amadey
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Raccoon
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Tofsee
Vidar
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
xmrig
Malware Config
C2 Extraction:
jainestaynor.xyz:80
patmushta.info
ovicrush.cn
2.56.59.26/dima/index.php
Unpacked files
SH256 hash:
e00ddba4fd34c7b0f0f2e547ee9e3ff4c0cb4d906f1ca26b17ba2e3f459c59bd
MD5 hash:
f03218d975c871ace950a3e3a445a60f
SHA1 hash:
99a56513362f72bd48a6f778b5ca81a02c5a559a
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments