MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b9a6ed57e23d874bde98d89d3c50a44b3982570cb8bbf41660fad19d3fbe855. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 0b9a6ed57e23d874bde98d89d3c50a44b3982570cb8bbf41660fad19d3fbe855
SHA3-384 hash: c1c5b717fc2146dd658268e94650694edca8f384b78c8ed34d14341c3eccd4c3dc2193ba5d92ec3ff68b7a524429eca6
SHA1 hash: 245b235c383d80ca2ae88681bf12f27bea96b92e
MD5 hash: 3a6af02d19a5f472a0357ccb50e5b0a6
humanhash: tennessee-arizona-saturn-fix
File name:file
Download: download sample
Signature RedLineStealer
File size:5'629'952 bytes
First seen:2022-10-24 11:03:24 UTC
Last seen:2022-10-24 12:15:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2a3d6e8d0b69cee4e38cad65ff04fa40 (1 x ArkeiStealer, 1 x RedLineStealer)
ssdeep 98304:xZc4ddDQkADTo0arkXDiBH9ftXnFmEuM2B4lXzqN346KNadVRvhfPqH:Dbv6UGDohFO/sY1rRJ
TLSH T16346337302560149E0E5CD39862BFDE5B2F713ABCF42B43C59EAA9C176168E0E787643
TrID 30.2% (.EXE) Win64 Executable (generic) (10523/12/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4505/5/1)
5.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://www.asimeformacion.es/12/AnlzrTrdng235965.exe

Intelligence


File Origin
# of uploads :
24
# of downloads :
216
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-10-24 11:05:29 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process from a recently created file
DNS request
Creating a file in the %temp% directory
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Launching cmd.exe command interpreter
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Detected VMProtect packer
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 729072 Sample: file.exe Startdate: 24/10/2022 Architecture: WINDOWS Score: 100 119 Malicious sample detected (through community Yara rule) 2->119 121 Antivirus detection for dropped file 2->121 123 Multi AV Scanner detection for dropped file 2->123 125 8 other signatures 2->125 14 file.exe 2 10 2->14         started        19 explorer.exe 2->19         started        21 explorer.exe 2->21         started        process3 dnsIp4 105 94.26.226.51, 49699, 80 PTC-YEMENNETYE Russian Federation 14->105 107 mobilasecondsatumare.ro 89.44.139.22 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 14->107 109 blackhk1.beget.tech 5.101.153.227, 49700, 80 BEGET-ASRU Russian Federation 14->109 93 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 14->93 dropped 95 C:\Users\user\AppData\...\explorer.exe, PE32+ 14->95 dropped 97 C:\Users\user\AppData\...\ME3GACL93MFDKMC.exe, PE32 14->97 dropped 99 3 other malicious files 14->99 dropped 111 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->111 113 Creates HTML files with .exe extension (expired dropper behavior) 14->113 115 Tries to detect virtualization through RDTSC time measurements 14->115 117 Drops PE files with benign system names 14->117 23 KJ85LK5398FKFFG.exe 6 14->23         started        26 cmd.exe 1 14->26         started        28 3MLHHJB4F9BF5A8.exe 14->28         started        37 3 other processes 14->37 31 WerFault.exe 19->31         started        33 WerFault.exe 19->33         started        35 WerFault.exe 21->35         started        file5 signatures6 process7 dnsIp8 129 Machine Learning detection for dropped file 23->129 40 reManeg.exe 7 23->40         started        44 explorer.exe 26->44         started        103 iplogger.org 148.251.234.83 HETZNER-ASDE Germany 28->103 131 Antivirus detection for dropped file 28->131 133 Multi AV Scanner detection for dropped file 28->133 135 May check the online IP address of the machine 28->135 85 C:\Windows\Temp\TempFolder\reManeg.exe, PE32 37->85 dropped 87 C:\Users\user\AppData\Local\Temp\aWI8.K, PE32 37->87 dropped 46 reManeg.exe 1 37->46         started        48 msiexec.exe 37->48         started        file9 signatures10 process11 file12 91 C:\...\RPJN8GRFHB86D5LRRLG7GF4FL1RH5S6.exe, PE32 40->91 dropped 137 Multi AV Scanner detection for dropped file 40->137 139 Obfuscated command line found 40->139 141 Machine Learning detection for dropped file 40->141 50 cmd.exe 40->50         started        52 conhost.exe 40->52         started        143 Antivirus detection for dropped file 44->143 145 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 44->145 147 Tries to detect virtualization through RDTSC time measurements 44->147 54 WerFault.exe 20 9 44->54         started        57 conhost.exe 46->57         started        59 WerFault.exe 46->59         started        signatures13 process14 dnsIp15 61 cmd.exe 50->61         started        63 conhost.exe 50->63         started        65 cmd.exe 50->65         started        101 192.168.2.1 unknown unknown 54->101 process16 process17 67 cmd.exe 61->67         started        process18 69 reManeg.exe 67->69         started        file19 89 C:\...\4C6MHF6NR7BPQR35QGMNBBHMMTPS92C.exe, PE32 69->89 dropped 127 Obfuscated command line found 69->127 73 cmd.exe 69->73         started        75 conhost.exe 69->75         started        signatures20 process21 process22 77 cmd.exe 73->77         started        79 conhost.exe 73->79         started        81 cmd.exe 73->81         started        process23 83 cmd.exe 77->83         started       
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2022-10-24 11:20:58 UTC
File Type:
PE (Exe)
AV detection:
23 of 25 (92.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:1515 discovery persistence spyware stealer vmprotect
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Vidar
Malware Config
C2 Extraction:
https://t.me/tg_privatetalk
https://nerdculture.de/@yixehi33
Unpacked files
SH256 hash:
0b9a6ed57e23d874bde98d89d3c50a44b3982570cb8bbf41660fad19d3fbe855
MD5 hash:
3a6af02d19a5f472a0357ccb50e5b0a6
SHA1 hash:
245b235c383d80ca2ae88681bf12f27bea96b92e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments