MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4fb57012d7a31e6511c4bac952323093e8bb51f138841f994f58259162dfd6e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Tofsee


Vendor detections: 16


Intelligence 16 IOCs 2 YARA File information Comments

SHA256 hash: e4fb57012d7a31e6511c4bac952323093e8bb51f138841f994f58259162dfd6e
SHA3-384 hash: 749e1853418327576609ee431f4cacb6fb63fa90af34aacb584fe1bb9607ec158d6278ca9cd48cff4171c84dffd45fdd
SHA1 hash: 59e81aa962c210df2005766230ff9c1a5a6cb3c9
MD5 hash: 9bd02920844e365715aa3272c3a537ed
humanhash: sixteen-early-eighteen-batman
File name:E4FB57012D7A31E6511C4BAC952323093E8BB51F13884.exe
Download: download sample
Signature Tofsee
File size:10'278'323 bytes
First seen:2022-05-07 10:36:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JK0xzMtDuGCsKhw8EsUdcQ2DrPzq3dxVl6XxTjVW8jHrA/y71ov5inaL:JKEMpuGlh/3dcnPE3leFjVW8jLBosaL
TLSH T145A63331EF419554F67FD7B4FEB64C44AEB91470C623E73B0AA98A50F212FD2806D922
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe Tofsee


Avatar
abuse_ch
Tofsee C2:
185.45.192.228:81

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.45.192.228:81 https://threatfox.abuse.ch/ioc/548657/
http://ugll.org/test3/get.php https://threatfox.abuse.ch/ioc/548659/

Intelligence


File Origin
# of uploads :
1
# of downloads :
517
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
E4FB57012D7A31E6511C4BAC952323093E8BB51F13884.exe
Verdict:
No threats detected
Analysis date:
2022-05-07 10:38:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys control.exe exploit overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nymaim Raccoon RedLine SmokeLoader Socel
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected MSILDownloaderGeneric
Yara detected Nymaim
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Tofsee
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 621963 Sample: E4FB57012D7A31E6511C4BAC952... Startdate: 07/05/2022 Architecture: WINDOWS Score: 100 72 208.95.112.1 TUT-ASUS United States 2->72 74 149.154.167.99 TELEGRAMRU United Kingdom 2->74 76 5 other IPs or domains 2->76 96 Multi AV Scanner detection for domain / URL 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 Antivirus detection for URL or domain 2->100 102 24 other signatures 2->102 10 E4FB57012D7A31E6511C4BAC952323093E8BB51F13884.exe 10 2->10         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->46 dropped 13 setup_installer.exe 24 10->13         started        process6 file7 48 C:\Users\user\AppData\...\setup_install.exe, PE32 13->48 dropped 50 C:\Users\user\AppData\...\Tue20e4377614f8.exe, PE32 13->50 dropped 52 C:\Users\user\...\Tue20d8c6a9051f65908.exe, PE32 13->52 dropped 54 19 other files (12 malicious) 13->54 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 70 127.0.0.1 unknown unknown 16->70 92 Adds a directory exclusion to Windows Defender 16->92 94 Disables Windows Defender (via service or powershell) 16->94 20 cmd.exe 1 16->20         started        22 cmd.exe 16->22         started        24 cmd.exe 16->24         started        26 13 other processes 16->26 signatures10 process11 signatures12 29 Tue20d8c6a9051f65908.exe 20->29         started        34 Tue20cf248c82313.exe 22->34         started        36 Tue20cbfaf8d6.exe 24->36         started        104 Adds a directory exclusion to Windows Defender 26->104 106 Disables Windows Defender (via service or powershell) 26->106 38 Tue2076f26623.exe 26->38         started        40 Tue20204f2267eb31.exe 26->40         started        42 Tue209acb3fa9ddb.exe 26->42         started        44 7 other processes 26->44 process13 dnsIp14 78 94.103.85.170 VDSINA-ASRU Russian Federation 29->78 80 162.241.224.113 UNIFIEDLAYER-AS-1US United States 29->80 84 16 other IPs or domains 29->84 56 C:\Users\user\...56iceProcessX64[1].bmp, PE32+ 29->56 dropped 58 C:\Users\user\...\3c5dgug63drvag[1].exe, PE32 29->58 dropped 60 C:\Users\user\AppData\Local\...\wam[1].exe, PE32 29->60 dropped 68 27 other files (7 malicious) 29->68 dropped 108 Antivirus detection for dropped file 29->108 110 Creates HTML files with .exe extension (expired dropper behavior) 29->110 112 Disable Windows Defender real time protection (registry) 29->112 86 4 other IPs or domains 34->86 114 Query firmware table information (likely to detect VMs) 34->114 116 Tries to detect sandboxes and other dynamic analysis tools (window names) 34->116 130 3 other signatures 34->130 118 Machine Learning detection for dropped file 36->118 132 2 other signatures 36->132 88 2 other IPs or domains 38->88 62 C:\Users\user\...62iceProcessX64[2].bmp, PE32+ 38->62 dropped 64 C:\Users\...\L5u954K7R1EWHUcTaI0ddEEf.exe, PE32+ 38->64 dropped 120 Detected unpacking (creates a PE file in dynamic memory) 38->120 122 Tries to harvest and steal browser information (history, passwords, etc) 38->122 90 2 other IPs or domains 40->90 124 Detected unpacking (overwrites its own PE header) 40->124 82 199.59.242.150 BODIS-NJUS United States 42->82 66 C:\Users\user\...\Tue201a9d15e2cf3.tmp, PE32 44->66 dropped 126 Obfuscated command line found 44->126 128 Injects a PE file into a foreign processes 44->128 file15 signatures16
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2021-12-21 23:52:04 UTC
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:onlylogger family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:8fc55a7ea41b0c5db2ca3c881e20966100c28a40 botnet:915 botnet:media24nps botnet:v3user1 aspackv2 backdoor evasion infostealer loader spyware stealer suricata trojan
Behaviour
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
65.108.69.168:13293
159.69.246.184:13127
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
Unpacked files
SH256 hash:
3838a3056d2ffcadce93fc3308e8b05ab1a9ba80d62ab1e5795b3a93059ddda3
MD5 hash:
eef5aa795b8c7bd8cde26f28ae865417
SHA1 hash:
c3f7e948d95d11295cd1e6d6827664df6bea2fef
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
e7b8877389f0bfb5fb95f08a799a0e7d06a2f7161a0287552ff3eadf06bd1dd1
MD5 hash:
e9eb471509abbfb4456285e82b25d1c9
SHA1 hash:
b96ef576c147ea8a1b3e0bd5430117ba9ad31096
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
Detections:
win_vidar_auto
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
8ff9b38ebb1303510ff8f0e28b52e7894fef387686432167bb94efedb9d93da2
MD5 hash:
b5b7e0b3478f8329991400508e65e233
SHA1 hash:
ff3808a1a9a7befc9d1ca409ee8ea985a0b37b38
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
d97558402d593864a51c596403872cc7c9eeff3cadd3953058e6bd086f5778fe
MD5 hash:
1fc3802ff489549d982087da0f4340b0
SHA1 hash:
c9ed0add6475d01d6a76e52a956ee78b423f7323
SH256 hash:
190596e482f74a043d25eabed4c87c4e5a4d9af41ccfe04a58ceeffc8d857a6b
MD5 hash:
ed16947584179d92c5343a2d85d0a9c0
SHA1 hash:
c79b3bdca2038db1be91bbddf5bacb17c4f78152
SH256 hash:
3cff1cc3b99d53e9f198070a4ecfdb426287166b8ebf1cff6375350537cb5132
MD5 hash:
21c5a6ae927ca8451d6fb471ccf45094
SHA1 hash:
a62868c9d19c6b4be48c17eced49de8a5114d40d
SH256 hash:
79ad03818cf1b61571b5d56e6e6ffa3fa8f218be9c60d50df354e3c5b02b23b3
MD5 hash:
4bfda1ec7a3f9595359d57ef6843e4e5
SHA1 hash:
97d1d10b316567fd15707b64e01326bb0ec1671f
SH256 hash:
2562da6fb36c99d0a87e7af2260f37d4d446e27a45ced6adca2b5b5554ccb8c1
MD5 hash:
5334249093a87b733a373670e159392c
SHA1 hash:
9721dac29e8c4b2b877e539c3322b7fe8910e47b
SH256 hash:
814e41d816661fa318ed457726873f9b7f67f8420a020b15434623eb67fafa8e
MD5 hash:
6668f13388cb7ba25d1f2e693f60c88e
SHA1 hash:
8eba067058a1c2837dfe780b3d9f55764fc82b76
SH256 hash:
1884040e60211cdd042c22fee5c804f7eb0e13e3b0509a55b1534115b7b4813d
MD5 hash:
32dd897601e4b0ea2daab7255f8544aa
SHA1 hash:
78eef5724a2cac7d4b0b18f8efd42dcaa6d06d34
SH256 hash:
e4137380bcd79d467ab567a8e04b4e33ef5189becd1187981cf44bebe1ff6e9d
MD5 hash:
c5699a1f388545728f466fe14b0c2300
SHA1 hash:
647dfb34865bf08add9f015d254533938cf44f47
SH256 hash:
1f2c175755620d102a7951c2b9c770a5b8e96020d3f91a976cccf520001cd67c
MD5 hash:
ecd3bdf9d320186f5e1a2b79564f97bc
SHA1 hash:
34889e5106bffd0ea25166b91ecc917da2054566
SH256 hash:
c351bc4f9c627c9af080192bc3691055b97fb21eb5f72f899770f11cd27ffb88
MD5 hash:
7fc8c390e075a75b1b98203c86fdc0f1
SHA1 hash:
2825763437dd1b15b2243516a220c08bc389af8f
SH256 hash:
f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
MD5 hash:
7e32ef0bd7899fa465bb0bc866b21560
SHA1 hash:
115d09eeaff6bae686263d57b6069dd41f63c80c
SH256 hash:
2ea8a5fa993f274677e80d22a75a61f021494e6af66e7df4e4f7ca1d3b6f66a5
MD5 hash:
f2f37c6152b279bd5cdfd8d0d36c9bd7
SHA1 hash:
b8fd954bd3212ee30b4de07ef78a622ea321e143
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
af14971113cb20df7151e3acc127f60a802e9a0923ccb97a4b99ce140e217b19
MD5 hash:
1dd28483275502da2d013c2d1b76c0fa
SHA1 hash:
b68caa428e08da562c44e059627f0b3070f7a02c
SH256 hash:
5a7438ceedce5e4cdba1210fa03d7611bf6a5f7fb9328fb932b8ae20ac4d825f
MD5 hash:
22e9f13a00780a53338d2370ba0c88a3
SHA1 hash:
892d5a88627b70c75989fc752fdc09cdd6b71138
SH256 hash:
53575712ca3d17601b465ebc9bd3a2777d8d1b694cdc90aa821b7cbdbb50ed41
MD5 hash:
e386f712948a12a6715c056328324864
SHA1 hash:
54413a9cb3cc070d5b4b814d419a2ecf533d7541
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
ec72974a5a5ff9769e8820e0ecac3288599c4bf33e2b3e2e019321655a86bc71
MD5 hash:
0e11d0e9da5e74db849ebf35d8006bca
SHA1 hash:
83cb711586ef32d381ac1fa8d3b5a7da18421f2d
SH256 hash:
88734006047ef980524097e944a347a6ecfc890371c645b1049e93d3400c517a
MD5 hash:
cf57d74605a487a33dc06edf878c7b12
SHA1 hash:
9d181feea989cd86622926e27d6041410f578679
SH256 hash:
1ae94277a17ae0f1775f5a73d6c7348550c4e99e680af052c49a2eff112adf1b
MD5 hash:
6d00b5a771f54975a7393d888c9bfef6
SHA1 hash:
c8bcf6d665f36efc37af18bab3d7e16798deceee
SH256 hash:
d644f6ab45b641567da93a7ff0f5cc84058c8428a0331b908d92488f5547c7c5
MD5 hash:
622fcb9ffe0c451fb46d636c5d830865
SHA1 hash:
8055c9f8997098fd46e9d8d09b9a71e90432da2e
SH256 hash:
e4fb57012d7a31e6511c4bac952323093e8bb51f138841f994f58259162dfd6e
MD5 hash:
9bd02920844e365715aa3272c3a537ed
SHA1 hash:
59e81aa962c210df2005766230ff9c1a5a6cb3c9
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments