MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0210249ad4e28abb5351c235129b06f5da7d2719cb3a7c8f47087d4f38de5877. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 17


Intelligence 17 IOCs YARA 8 File information Comments

SHA256 hash: 0210249ad4e28abb5351c235129b06f5da7d2719cb3a7c8f47087d4f38de5877
SHA3-384 hash: ea8e1b1f1fde79a56e36fbc6e445c4b3774bc6293c49d408a1f1e009bc01face01fe06ac924876cd141f16fd93d57cce
SHA1 hash: dd759954657e7147a49b8f79ba141bffda8afecd
MD5 hash: 71f8754c671dd9eddcecb2e114a8b7e0
humanhash: papa-mobile-nine-purple
File name:file
Download: download sample
Signature RecordBreaker
File size:1'611'776 bytes
First seen:2023-10-30 21:11:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:lGzFxxRo8RBOxNySZP5SBMNdkDb+RM1ryr:AzFxxRZRbS9gBnxi
Threatray 2'478 similar samples on MalwareBazaar
TLSH T1D0752312EFD880A2C8B61F7004F65A831A39BDD60A318F3F335559DF5C62644F9A1B6B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter andretavare5
Tags:exe recordbreaker


Avatar
andretavare5
Sample downloaded from http://109.107.182.2/race/bus50.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
396
Origin country :
US US
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching a service
Сreating synchronization primitives
Creating a file
Creating a window
Launching cmd.exe command interpreter
Searching for synchronization primitives
Running batch commands
Behavior that indicates a threat
Forced shutdown of a system process
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, RedLin
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1334546 Sample: file.exe Startdate: 30/10/2023 Architecture: WINDOWS Score: 100 188 Found malware configuration 2->188 190 Malicious sample detected (through community Yara rule) 2->190 192 Antivirus detection for URL or domain 2->192 194 20 other signatures 2->194 13 file.exe 1 4 2->13         started        process3 file4 164 C:\Users\user\AppData\Local\...\eN9NH92.exe, PE32 13->164 dropped 166 C:\Users\user\AppData\Local\...\7zG1DX14.exe, PE32 13->166 dropped 16 eN9NH92.exe 1 4 13->16         started        process5 file6 110 C:\Users\user\AppData\Local\...\xc3SV36.exe, PE32 16->110 dropped 112 C:\Users\user\AppData\Local\...\6rc7uK6.exe, PE32 16->112 dropped 184 Antivirus detection for dropped file 16->184 186 Machine Learning detection for dropped file 16->186 20 xc3SV36.exe 1 4 16->20         started        24 Vy1Hu5an.exe 16->24         started        26 6rc7uK6.exe 16->26         started        signatures7 process8 file9 130 C:\Users\user\AppData\Local\...\jh2EN16.exe, PE32 20->130 dropped 132 C:\Users\user\AppData\Local\...\5iE0fh9.exe, PE32 20->132 dropped 212 Antivirus detection for dropped file 20->212 214 Multi AV Scanner detection for dropped file 20->214 216 Machine Learning detection for dropped file 20->216 28 jh2EN16.exe 1 4 20->28         started        32 5iE0fh9.exe 20->32         started        134 C:\Users\user\AppData\Local\...\2WH325zX.exe, PE32 24->134 dropped 136 C:\Users\user\AppData\Local\...\1SG67HM5.exe, PE32 24->136 dropped 34 1SG67HM5.exe 24->34         started        signatures10 process11 file12 158 C:\Users\user\AppData\Local\...\TI5eG99.exe, PE32 28->158 dropped 160 C:\Users\user\AppData\Local\...\4QY748yW.exe, PE32 28->160 dropped 250 Antivirus detection for dropped file 28->250 252 Machine Learning detection for dropped file 28->252 36 TI5eG99.exe 1 4 28->36         started        39 4QY748yW.exe 28->39         started        162 C:\Users\user\AppData\Local\...\explothe.exe, PE32 32->162 dropped 42 explothe.exe 32->42         started        254 Writes to foreign memory regions 34->254 256 Allocates memory in foreign processes 34->256 258 Injects a PE file into a foreign processes 34->258 45 AppLaunch.exe 34->45         started        signatures13 process14 dnsIp15 138 C:\Users\user\AppData\Local\...\Pl0IS99.exe, PE32 36->138 dropped 140 C:\Users\user\AppData\Local\...\3ax31qx.exe, PE32 36->140 dropped 47 3ax31qx.exe 36->47         started        50 Pl0IS99.exe 1 4 36->50         started        53 Conhost.exe 36->53         started        236 Writes to foreign memory regions 39->236 238 Allocates memory in foreign processes 39->238 240 Injects a PE file into a foreign processes 39->240 55 AppLaunch.exe 39->55         started        182 77.91.124.1 ECOTEL-ASRU Russian Federation 42->182 142 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 42->142 dropped 144 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 42->144 dropped 242 Creates an undocumented autostart registry key 42->242 244 Uses schtasks.exe or at.exe to add and modify task schedules 42->244 58 cmd.exe 42->58         started        60 schtasks.exe 42->60         started        62 rundll32.exe 42->62         started        file16 signatures17 process18 dnsIp19 260 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 47->260 262 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 47->262 264 Maps a DLL or memory area into another process 47->264 268 2 other signatures 47->268 64 explorer.exe 31 30 47->64 injected 69 Vj2kH2Vc.exe 47->69         started        126 C:\Users\user\AppData\Local\...\2rk8669.exe, PE32 50->126 dropped 128 C:\Users\user\AppData\Local\...\1uw00Nl8.exe, PE32 50->128 dropped 71 1uw00Nl8.exe 50->71         started        73 2rk8669.exe 50->73         started        180 77.91.124.86 ECOTEL-ASRU Russian Federation 55->180 266 Found many strings related to Crypto-Wallets (likely being stolen) 55->266 75 cmd.exe 58->75         started        77 conhost.exe 58->77         started        79 cmd.exe 58->79         started        83 4 other processes 58->83 81 conhost.exe 60->81         started        file20 signatures21 process22 dnsIp23 168 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 64->168 170 77.91.68.249 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 64->170 172 3 other IPs or domains 64->172 114 C:\Users\user\AppData\Local\Temp\FE52.exe, PE32 64->114 dropped 116 C:\Users\user\AppData\Local\Temp\FB72.exe, PE32 64->116 dropped 118 C:\Users\user\AppData\Local\TempFAA.exe, PE32 64->118 dropped 124 10 other malicious files 64->124 dropped 196 System process connects to network (likely due to code injection or exploit) 64->196 198 Benign windows process drops PE files 64->198 85 7CA2.exe 64->85         started        89 8C55.exe 64->89         started        91 8E79.exe 64->91         started        99 4 other processes 64->99 120 C:\Users\user\AppData\Local\...\MH9bz1IR.exe, PE32 69->120 dropped 122 C:\Users\user\AppData\Local\...\4bv104Pb.exe, PE32 69->122 dropped 200 Antivirus detection for dropped file 69->200 202 Machine Learning detection for dropped file 69->202 93 MH9bz1IR.exe 69->93         started        204 Contains functionality to inject code into remote processes 71->204 206 Writes to foreign memory regions 71->206 208 Allocates memory in foreign processes 71->208 95 AppLaunch.exe 9 1 71->95         started        97 AppLaunch.exe 71->97         started        210 Injects a PE file into a foreign processes 73->210 101 3 other processes 73->101 104 2 other processes 75->104 file24 signatures25 process26 dnsIp27 146 C:\Users\user\AppData\Local\...\Dx2KD5uL.exe, PE32 85->146 dropped 148 C:\Users\user\AppData\Local\...\6XT01cY.exe, PE32 85->148 dropped 218 Antivirus detection for dropped file 85->218 220 Machine Learning detection for dropped file 85->220 106 Dx2KD5uL.exe 85->106         started        222 Multi AV Scanner detection for dropped file 89->222 224 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 89->224 226 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 89->226 228 Tries to harvest and steal browser information (history, passwords, etc) 89->228 150 C:\Users\user\AppData\Local\...\Vy1Hu5an.exe, PE32 93->150 dropped 152 C:\Users\user\AppData\Local\...\3af0OA39.exe, PE32 93->152 dropped 230 Modifies windows update settings 95->230 232 Disable Windows Defender notifications (registry) 95->232 234 Disable Windows Defender real time protection (registry) 95->234 174 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 101->174 176 192.168.2.6 unknown unknown 104->176 178 239.255.255.250 unknown Reserved 104->178 file28 signatures29 process30 file31 154 C:\Users\user\AppData\Local\...\Vj2kH2Vc.exe, PE32 106->154 dropped 156 C:\Users\user\AppData\Local\...\5RZ78oR.exe, PE32 106->156 dropped 246 Antivirus detection for dropped file 106->246 248 Machine Learning detection for dropped file 106->248 signatures32
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-10-30 21:12:05 UTC
File Type:
PE (Exe)
Extracted files:
226
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:glupteba family:povertystealer family:raccoon family:redline family:sectoprat family:smokeloader family:zgrat botnet:6a6a005b9aa778f606280c5fa24ae595 botnet:@ytlogsbot botnet:grome botnet:kinza botnet:pixelnew botnet:up3 backdoor dropper evasion infostealer loader persistence rat stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Downloads MZ/PE file
Stops running service(s)
Amadey
Detect Poverty Stealer Payload
Detect ZGRat V1
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
Poverty Stealer
Raccoon
Raccoon Stealer payload
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
ZGRat
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1/theme/index.php
194.169.175.235:42691
194.49.94.11:80
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
255fc7923dd3ce62b90f54a6b3fbc4c8d981197b447e025f7475c493131c88c1
MD5 hash:
6f2aa9b91aae320d212ad917fd40db1d
SHA1 hash:
bd5dd7c04ee2e728ef249224cea156994583c961
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
9ada18c4947285f1379666226cdedb60e52e6983b4ea121b89226bd554e62fb7
MD5 hash:
554a643b32088dc3d19f150ab943ddf1
SHA1 hash:
e0345f1d1e29d4fb90bdbb0b30266c75c27c1c4a
SH256 hash:
cead196e79c62d409cc585dcd65cafa12b1de5f23dc713447e5675a586185261
MD5 hash:
0ba95bbaaedc6071e20ce92aae9f4e86
SHA1 hash:
4e31f7a0332ad0209fc2bb0ce81897f73ed14401
SH256 hash:
3e4478e149ff55fc97fe1a690d9be008d7e88a94a5100286c21bde98f04cfd65
MD5 hash:
09f6c0677b0c7adad66759e91631def4
SHA1 hash:
5c6469cf6ddc6f235195cd05a420fd532bd05fb7
SH256 hash:
0210249ad4e28abb5351c235129b06f5da7d2719cb3a7c8f47087d4f38de5877
MD5 hash:
71f8754c671dd9eddcecb2e114a8b7e0
SHA1 hash:
dd759954657e7147a49b8f79ba141bffda8afecd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments