MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f92cfeb06515f18113a950d5bd569a23cdd85514ef509ccff6c5a4e9a08ca4c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Glupteba
Vendor detections: 13
| SHA256 hash: | f92cfeb06515f18113a950d5bd569a23cdd85514ef509ccff6c5a4e9a08ca4c7 |
|---|---|
| SHA3-384 hash: | bd72ccb8e5f3e8272935efbdecbff059e3b18d257d95463fe47c52a5eec3678d8594abfaf96d7916b7545621770f1157 |
| SHA1 hash: | 3ddf56275a2132a384d251247f38cc086b6db914 |
| MD5 hash: | 7b15ff87e11bd9bc7512b41635b68aeb |
| humanhash: | nine-july-red-delaware |
| File name: | setup_x86_x64_install.exe |
| Download: | download sample |
| Signature | Glupteba |
| File size: | 7'443'842 bytes |
| First seen: | 2021-09-16 14:10:50 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 196608:yDwyI0Mc3QVr8KLiQ7QhrN/0eKifqCxnbiJtyw07oVa:ykj0Mc3Qppihr90eKif3xstf9U |
| Threatray | 551 similar samples on MalwareBazaar |
| TLSH | T1D87633F7BAF85C63DAEFF875036294DE9A36B67E0458C2B213E1F9D2518106DC8E1406 |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | exe Glupteba Loader |
Intelligence
File Origin
# of uploads :
1
# of downloads :
1'432
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-09-16 21:00:30 UTC
Tags:
trojan evasion loader rat redline stealer vidar opendir banker dridex raccoon unwanted netsupport danabot
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CookieStealer
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
overlay packed
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected VMProtect packer
Drops PE files with a suspicious file extension
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Detection:
raccoon
Threat name:
Win32.Trojan.Jaik
Status:
Malicious
First seen:
2021-09-16 14:11:06 UTC
AV detection:
31 of 44 (70.45%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 541 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:ani botnet:medianew aspackv2 backdoor infostealer stealer themida trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
https://dimonbk83.tumblr.com/
45.142.215.47:27643
91.121.67.60:62102
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.142.215.47:27643
91.121.67.60:62102
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
c598a971f1d8bc58362396b10df4359654354e6c7b1b56741cea2a532e9bdd94
MD5 hash:
3367116dc59fc2b806bb5ec8c36bf2b6
SHA1 hash:
f4fb01a1efff6c7969383ccf7f64e4ac8cfc2c6f
SH256 hash:
67273f31f3c4fb9a72a149379b33291bf098e8f2be32a4e0a4ce247c8b6ff85c
MD5 hash:
919f41f3605f62145133f17a47d9d230
SHA1 hash:
fa9327ab5ec671980d316b83b45d6c5c89a02a46
SH256 hash:
da6e2470414935131c3a094758be78605ec1c1ba8ddc755d175ac73763cc307a
MD5 hash:
03cd7541a32149209ecec14115466bc3
SHA1 hash:
bff67b407cffb1d3f3afbbcee15046e968204af3
SH256 hash:
e9fd86804d20e3a8ae0009e77785d223839b014721437c4ef5ab9625930f8a88
MD5 hash:
c9fff306161f9c0edb488b6e03b82631
SHA1 hash:
917148ebdb2a3fe88df516689ff0768336802007
SH256 hash:
04b8148abe3ff102a53f7b834c3c7472152d69f5c59190a003e791bbd78d0928
MD5 hash:
8439bf284b245030e82d2f792dfe8f35
SHA1 hash:
7ec822481625879ac9643f5867d340531e692a63
SH256 hash:
4faef6284d19d4f5e292ac2a9cd227c5061cfc913400e4e95d6ea01c078fd4eb
MD5 hash:
f34bdf50eb96d47ed225218b8bd2bcb4
SHA1 hash:
7147841f91fdda11423b481f99cc15420997db06
SH256 hash:
52701e2808de643baf6789222e4c2422cca70733222cd2e6d0b9f36a4f6eeabc
MD5 hash:
71a718d5f6f6a69ce1e844fec2a06f53
SHA1 hash:
5e3d339c99bb37e485eeadb71c9aa72a8e06fdab
SH256 hash:
25743b4ff2ab04c2c99e7ce5e7b1300a2b9398cd7d637709f83823dcb2f24eea
MD5 hash:
93133e63f2a86185a0e36d7b7be20256
SHA1 hash:
56a38082d4ec9e24e63dcad9e43e77f06d8561ac
SH256 hash:
e2b5936aa49d61c023e171ce099bc9d267a235c12a1f19cac9e4176fc453cace
MD5 hash:
f3594b86713f69b5614068e342a389e4
SHA1 hash:
1cde0c59ee2ea7e7b80463c280e7e9d96d966016
SH256 hash:
44e0643128cf12ca0619d774ac391aa1f65c7f62d9dd579d6551221552567cc6
MD5 hash:
ca2f2a8732e3388fd2f05e14d3094591
SHA1 hash:
073c76d8f720634fe1569a508cfcb3f336b96c22
SH256 hash:
1c25cf63ef5ab14f293ea29c88f1aa4be0423de32c588d18e8bc1d2e3b940144
MD5 hash:
0e0a60c252f2ca0b5621d61fe9ffdf43
SHA1 hash:
b191d77d9af5213360960496516a8355c52dcfe5
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
38046382500f1739883d2c53639ffbc5756843da7574fe3e6820724f522958e2
MD5 hash:
33600475b2cc5445df2d3809c3798311
SHA1 hash:
3cb60432de30b82e87b8b607e0180a7843128b5a
Parent samples :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 hash:
d1417ebebd174d666a6abc9481d65b39fc2d88559f7fd92ebb7e2f1ae93787db
MD5 hash:
70220a3ce6ffd34101b3770342505f2c
SHA1 hash:
b55c421634d8eeaec5c6193f34c04625d21a9ae9
SH256 hash:
ec32b38e5ad5c285c1d6d8237341a99772709e8e4ea23db953d63ab8f078379c
MD5 hash:
ccf4a60623b784b084855d0468d76eab
SHA1 hash:
9419cc65a1bb70e8780f6da7cedd169eb333db88
SH256 hash:
8e7a4fce0262549ceaf77c47afebd1a4b67b3bb4b33e3a380f6104c695cb71f6
MD5 hash:
15a25b9bc503bc65c0f76c15854537d8
SHA1 hash:
084179140570874040dc41e52b69ea139b51199e
Detections:
win_socelars_auto
SH256 hash:
2acd4cd66cbc8f0116817350a80e7614c2a9c59e524c4956a93eb553e74f5ed8
MD5 hash:
20950d47ef36acf9a7bcdf42fd6dce72
SHA1 hash:
93c69ad432cf0d1f1a5b42988ff1fee78732121b
SH256 hash:
8f4d02d3f8220a774bfab9c33bec95b1b539c0212f70159fc470f43759dd302a
MD5 hash:
beb8f5190a21969ff748fa14c83c5b82
SHA1 hash:
d960cc6545c23c8c510b27836d7884ae59c6422b
SH256 hash:
546bc6a7802b98c188fb9a92ef20f89aaf597e205b4101c396cbe26d8779a768
MD5 hash:
d4a5c3f449aa7bd18a632731b2682255
SHA1 hash:
158a0a1a98867fa0194433f60aa6a9c13097f214
SH256 hash:
35d78455501b41a5351a9496a502c8f72978676a0989c9c23c2ea0752a3ebd25
MD5 hash:
222abe999254533d009b74251d81e587
SHA1 hash:
c4685d7857b9e870c53e6f044d71410c50b02dd3
SH256 hash:
f92cfeb06515f18113a950d5bd569a23cdd85514ef509ccff6c5a4e9a08ca4c7
MD5 hash:
7b15ff87e11bd9bc7512b41635b68aeb
SHA1 hash:
3ddf56275a2132a384d251247f38cc086b6db914
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.