MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Adware.Eorezo


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 9 File information Comments

SHA256 hash: e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5
SHA3-384 hash: 6eaa5c47570c1aedd23b16b87c40a7b6bc51b82feed9a2a9ebc13d873da35b07af3fa218cc457e3c8a9243dd770ab579
SHA1 hash: a108fb238a98c5090e3824db51a8a92ce0eb6cb1
MD5 hash: 78260204ab2a8d1039ea744d228ced1f
humanhash: one-blossom-solar-aspen
File name:78260204AB2A8D1039EA744D228CED1F.exe
Download: download sample
Signature Adware.Eorezo
File size:3'787'308 bytes
First seen:2021-03-24 07:03:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 98304:UbR1dh6claIxZJrXentG2P8aGsw2kvpDNsK:UN1dIcljZ9MJP8fP75F
Threatray 8 similar samples on MalwareBazaar
TLSH CB063342B7D869B2D1720A725928E765243C7E212F268E9FF3D4262EDF740D0DA30B57
Reporter abuse_ch
Tags:Adware.Eorezo exe


Avatar
abuse_ch
Adware.Eorezo C2:
http://ichynkara.xyz/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://ichynkara.xyz/ https://threatfox.abuse.ch/ioc/4608/

Intelligence


File Origin
# of uploads :
1
# of downloads :
186
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
78260204AB2A8D1039EA744D228CED1F.exe
Verdict:
Malicious activity
Analysis date:
2021-03-24 07:07:46 UTC
Tags:
evasion trojan loader stealer rat redline autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Sending a UDP request
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a file in the %temp% directory
Creating a file
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Reading critical registry keys
Deleting a recently created file
Creating a file in the %AppData% directory
Connecting to a non-recommended domain
Changing a file
Launching a process
Using the Windows Management Instrumentation requests
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Socelars
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Drops PE files to the document folder of the user
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Sigma detected: Regsvr32 Anomaly
Submitted sample is a known malware sample
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Socelars
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 374781 Sample: NocSbjtb9r.exe Startdate: 24/03/2021 Architecture: WINDOWS Score: 100 140 Multi AV Scanner detection for domain / URL 2->140 142 Antivirus detection for URL or domain 2->142 144 Multi AV Scanner detection for dropped file 2->144 146 7 other signatures 2->146 10 NocSbjtb9r.exe 13 2->10         started        process3 file4 92 C:\Users\user\Desktop\aszd.exe, PE32 10->92 dropped 94 C:\Users\user\Desktop\md9_9sjm.exe, MS-DOS 10->94 dropped 96 C:\Users\user\Desktop\pzysgf.exe, PE32 10->96 dropped 98 5 other files (none is malicious) 10->98 dropped 13 mmt.exe 10->13         started        17 pzysgf.exe 3 2 10->17         started        19 cllhjkd.exe 7 10->19         started        21 5 other processes 10->21 process5 dnsIp6 112 5.101.110.225 DIGITALOCEAN-ASNUS Netherlands 13->112 100 C:\Users\user\AppData\Local\...\setups.exe, PE32 13->100 dropped 102 C:\Users\user\AppData\...\multitimer.exe, PE32 13->102 dropped 24 setups.exe 13->24         started        28 multitimer.exe 13->28         started        114 208.95.112.1 TUT-ASUS United States 17->114 116 157.240.17.35 FACEBOOKUS United States 17->116 122 3 other IPs or domains 17->122 104 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 17->104 dropped 106 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 17->106 dropped 31 jfiag3g_gg.exe 17->31         started        33 jfiag3g_gg.exe 17->33         started        35 cmd.exe 19->35         started        118 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 21->118 120 88.99.66.31 HETZNER-ASDE Germany 21->120 124 2 other IPs or domains 21->124 108 C:\Users\user\Documents\...\md9_9sjm.exe, MS-DOS 21->108 dropped 148 Drops PE files to the document folder of the user 21->148 37 WerFault.exe 20 7 21->37         started        39 explorer.exe 21->39 injected file7 signatures8 process9 dnsIp10 78 C:\Users\user\AppData\Local\...\setups.tmp, PE32 24->78 dropped 150 Multi AV Scanner detection for dropped file 24->150 41 setups.tmp 24->41         started        110 104.248.119.44 DIGITALOCEAN-ASNUS United States 28->110 152 Tries to harvest and steal browser information (history, passwords, etc) 31->152 80 C:\Users\user\AppData\Local\...\ySerjRi2.exe, PE32 35->80 dropped 154 Submitted sample is a known malware sample 35->154 44 ySerjRi2.exe 35->44         started        46 conhost.exe 35->46         started        48 taskkill.exe 35->48         started        file11 signatures12 process13 file14 84 C:\Users\user\AppData\Local\...\psvince.dll, PE32 41->84 dropped 86 C:\Users\user\AppData\...\itdownload.dll, PE32 41->86 dropped 88 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 41->88 dropped 90 2 other files (none is malicious) 41->90 dropped 50 iexplore.exe 41->50         started        52 iexplore.exe 41->52         started        54 iexplore.exe 41->54         started        56 cmd.exe 44->56         started        59 cmd.exe 44->59         started        process15 file16 61 iexplore.exe 50->61         started        64 iexplore.exe 50->64         started        66 iexplore.exe 52->66         started        82 C:\Users\user\AppData\Local\Temp\DC0GX.w, PE32 56->82 dropped 68 conhost.exe 56->68         started        70 cmd.exe 56->70         started        72 cmd.exe 56->72         started        74 regsvr32.exe 56->74         started        76 conhost.exe 59->76         started        process17 dnsIp18 134 2 other IPs or domains 61->134 126 93.158.134.119 YANDEXRU Russian Federation 64->126 128 87.248.118.22 YAHOO-DEBDE United Kingdom 64->128 136 46 other IPs or domains 64->136 130 104.244.42.131 TWITTERUS United States 66->130 132 104.244.42.69 TWITTERUS United States 66->132 138 13 other IPs or domains 66->138
Threat name:
Win32.Infostealer.Passteal
Status:
Malicious
First seen:
2021-03-21 09:36:33 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:icedid family:metasploit family:raccoon family:redline family:smokeloader family:vidar family:xmrig botnet:2ce901d964b370c5ccda7e4d68354ba040db8218 backdoor banker discovery dropper infostealer loader miner persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Maps connected drives based on registry
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Sets service image path in registry
UPX packed file
IcedID First Stage Loader
XMRig Miner Payload
Glupteba
Glupteba Payload
IcedID, BokBot
MetaSploit
Raccoon
RedLine
SmokeLoader
Vidar
xmrig
Malware Config
C2 Extraction:
http://funzel.info/upload/
http://doeros.xyz/upload/
http://vromus.com/upload/
http://hqans.com/upload/
http://vxeudy.com/upload/
http://poderoa.com/upload/
http://nezzzo.com/upload/
213podellkk.website
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
c7e6b132f585157dda631976809c211891d023838924260d146883045588f1d4
MD5 hash:
0a0a0724bb2879ec25ba35566c4cffa8
SHA1 hash:
224f2feb44d485821ac8e75fa3a4cd382ac9c7c1
SH256 hash:
8d3a67a08a02f34224b8ca9e2a7cd73c2985f8e34e8af712920e69a1782e3b88
MD5 hash:
7c605eab4a34bd4e81ec2842a289c969
SHA1 hash:
ecc6783fbb0b398a65ba15dbd2158c584c97562d
SH256 hash:
50f490fdd24a5ede027b89bd05700181e47e85f3573d8a7a05972caf465f71a7
MD5 hash:
02df443e79d56fb9427b26110880b33b
SHA1 hash:
0c0c59b62286f172872ed603831a9d1e10225cd9
SH256 hash:
6525d30654a1a8255ac9a366035d841b991648e442f3a802f919726d604e9ce4
MD5 hash:
799f15cb784fe1bd6922939d46426c20
SHA1 hash:
43cc59cf651dca1208271ab740a7820054df8ba0
SH256 hash:
2a56f4602424f2ef39ec10ee1a1300d3c5f39567f8dcb8c5e0db51dc194f5642
MD5 hash:
f9ed03b2ae5f3b3bf5b5735e0edf5876
SHA1 hash:
c6aba2a597c61210c458024cdc1b5a6fce4dbc89
SH256 hash:
6227fc3d268fa9de3afd8c8fd25971131a403d8b7d3d82a38de315bf98d0657d
MD5 hash:
f91875abf5be265530e11db100cf12df
SHA1 hash:
b10d41a84640b8fd7000f3ea136c6ce68dcbbb85
SH256 hash:
56d9d4adace647b1f44a3fb7b530e01cea7dbca4f8f52b022b0771324155ecae
MD5 hash:
015849bb88833f672dfd6d22f5c5a88c
SHA1 hash:
5c88e9f1d0e0025976c7d3db494e155c5e5d4d34
SH256 hash:
fa43084ee1fb07f1abec3ec472b3cfae67c889bcb770da89ba297a6e923e4eab
MD5 hash:
e457d821acec2a63d5f26b24cd93b719
SHA1 hash:
f92e772e4be53bdfc90b645fd90d545464d8caa0
SH256 hash:
bb34358303370c501818dc09717b54adbe6a8b2e1fdd13a04e9d3c6d86b4575c
MD5 hash:
827700b5b57d355e31c65c1f6e2cf017
SHA1 hash:
ccfc5e5eced7cd2c5cedb9e73180c232dbbb3344
SH256 hash:
f74dc2a29757485a3fd56875f34006715a9acb9fb410388f86d8feb52f11fd55
MD5 hash:
12ee9a07b79d99b694902f0f42f95874
SHA1 hash:
9cb54c7ea6fc2534a1c853cd190a4cdc5ad13479
SH256 hash:
b3f3f92a184053347007fd4a158b6a84a183be3201fb7b42db0a0f5975c3540c
MD5 hash:
ea3ca88c72ac0426c14afed3bf84a38e
SHA1 hash:
5ff91a898913296ffef5206681b4ff403c64a786
SH256 hash:
df4f0efb67f00b1a07fc519ecbdd3564712f86c1bcee9f1042dcf44d68002a50
MD5 hash:
22bf591bdcd374910e8da135c36e5722
SHA1 hash:
313f7a0920d795976fc642b5cf39320b110b1fb3
SH256 hash:
3a73251ea5060c5c5e196929ad5679893447eba561fc9094f6cf31896cfc04b9
MD5 hash:
6aa41ec7e0fc36afd5e5e9370b6a202f
SHA1 hash:
a3c0a7206d5e1d7c5bdacaf4b040858798a15d3a
SH256 hash:
9f3d57207d87acf2fe6f978f90b44b3036870a81d83d68c744f455fe83009ce1
MD5 hash:
95509b989314e6300d8f45a819b211bd
SHA1 hash:
b9fb25413ab279f7041432844d943cfbd3b94a67
Detections:
win_socelars_auto
SH256 hash:
e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5
MD5 hash:
78260204ab2a8d1039ea744d228ced1f
SHA1 hash:
a108fb238a98c5090e3824db51a8a92ce0eb6cb1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cryptocoin_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:XMRIG_Miner

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments