MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cc7883198df53af5b4e7d6b14204ea5ab51066a52031f8f814cedccc491bd9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 1 File information Comments

SHA256 hash: 0cc7883198df53af5b4e7d6b14204ea5ab51066a52031f8f814cedccc491bd9a
SHA3-384 hash: 23653ad1d3aa57fbedda9635f4b74f41414d93b2e681a58ab0c3ce7b45be7451ea16aed830f01cb5c2d9fcb2c7b517f3
SHA1 hash: 5e2ccbbade58f7449cf17118b48c6184681ee591
MD5 hash: 2bd1a9096b78743f5236452b590afdd3
humanhash: sixteen-tennis-grey-north
File name:2bd1a9096b78743f5236452b590afdd3.exe
Download: download sample
Signature RedLineStealer
File size:7'713'280 bytes
First seen:2023-07-11 11:30:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ee26deb5354c4489ff0dc7547168b2dc (3 x Amadey, 3 x RedLineStealer, 1 x PrivateLoader)
ssdeep 196608:y55H0eo/kBtjRMOYoJe4yBnvbECfjPMtIi8ZAe:yXUe3oVzBjEOrMtIf
TLSH T1757612EE728CA759C44EC43C8423BC45B175A5478BF585AA76CF33886FFA300E685786
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon f6a0e8989b8a8489 (2 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
147.135.165.22:17748

Intelligence


File Origin
# of uploads :
1
# of downloads :
299
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2bd1a9096b78743f5236452b590afdd3.exe
Verdict:
Malicious activity
Analysis date:
2023-07-11 11:32:13 UTC
Tags:
privateloader opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Modifying a system file
Сreating synchronization primitives
Replacing files
Launching a service
Launching a process
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Creating a file
Connecting to a non-recommended domain
Sending a UDP request
Forced system process termination
Searching for synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Changing a file
Launching the process to interact with network services
Launching the default Windows debugger (dwwin.exe)
Query of malicious DNS domain
Blocking the Windows Defender launch
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control lolbin packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Fabookie, PrivateLoader, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Windows Update Standalone Installer command line found (may be used to bypass UAC)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Fabookie
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1270808 Sample: TZazz2E6Cm.exe Startdate: 11/07/2023 Architecture: WINDOWS Score: 100 189 Multi AV Scanner detection for domain / URL 2->189 191 Found malware configuration 2->191 193 Malicious sample detected (through community Yara rule) 2->193 195 23 other signatures 2->195 11 TZazz2E6Cm.exe 10 45 2->11         started        process3 dnsIp4 141 188.114.96.7 CLOUDFLARENETUS European Union 11->141 143 87.240.129.133 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 11->143 145 16 other IPs or domains 11->145 101 C:\Users\...\v920cmkRbcAzyZaX2V3PnmAb.exe, PE32 11->101 dropped 103 C:\Users\...\q9liSdaXNEtNHhSwIKTwYxgU.exe, PE32 11->103 dropped 105 C:\Users\...\oA5zU2aIy1h6y3XZG1A2OtYg.exe, PE32 11->105 dropped 107 15 other malicious files 11->107 dropped 199 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->199 201 Creates HTML files with .exe extension (expired dropper behavior) 11->201 203 Disables Windows Defender (deletes autostart) 11->203 205 2 other signatures 11->205 16 Lcpov3SAN_jxPkvvr3epIvrF.exe 17 11->16         started        20 _r6dL35eVCBGfchbI4zmo9h0.exe 11->20         started        23 E1Do0JRFb5jvj7cQm1c5sI3b.exe 11->23         started        25 8 other processes 11->25 file5 signatures6 process7 dnsIp8 73 C:\Users\...\0c_HF0K__2M65ISxljvcijCc.exe, PE32+ 16->73 dropped 85 2 other malicious files 16->85 dropped 167 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 16->167 27 0c_HF0K__2M65ISxljvcijCc.exe 16->27         started        127 45.9.74.80 FIRST-SERVER-EU-ASRU Russian Federation 20->127 129 45.15.156.229 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 20->129 131 45.58.41.152 ATLANTIC-NET-1US United States 20->131 75 C:\Users\...\vJEWX4rOZ1gAmKUXsCuHDJ_E.exe, PE32 20->75 dropped 77 C:\Users\...\kXBzQbdQn2ZsvxM0rCeFWbgA.exe, PE32+ 20->77 dropped 79 C:\Users\...\Deqzm5VFJu6cS8eKohvOxaRV.exe, PE32+ 20->79 dropped 87 3 other malicious files 20->87 dropped 169 Disables Windows Defender (deletes autostart) 20->169 171 Disable Windows Defender real time protection (registry) 20->171 32 vJEWX4rOZ1gAmKUXsCuHDJ_E.exe 20->32         started        34 Deqzm5VFJu6cS8eKohvOxaRV.exe 20->34         started        36 kXBzQbdQn2ZsvxM0rCeFWbgA.exe 20->36         started        173 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 23->173 175 Maps a DLL or memory area into another process 23->175 177 Checks if the current machine is a virtual machine (disk enumeration) 23->177 179 Creates a thread in another existing process (thread injection) 23->179 38 explorer.exe 23->38 injected 133 87.240.132.67 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 25->133 135 149.154.167.99 TELEGRAMRU United Kingdom 25->135 137 6 other IPs or domains 25->137 81 C:\Users\user\AppData\Local\Temp\dnuOsu.XL, PE32 25->81 dropped 83 C:\Users\user\AppData\Local\...\v4105610.exe, PE32 25->83 dropped 89 2 other malicious files 25->89 dropped 181 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 25->181 183 Tries to harvest and steal browser information (history, passwords, etc) 25->183 185 Writes to foreign memory regions 25->185 187 3 other signatures 25->187 40 v4105610.exe 25->40         started        42 AppLaunch.exe 25->42         started        44 AppLaunch.exe 25->44         started        46 msiexec.exe 25->46         started        file9 signatures10 process11 dnsIp12 147 188.114.97.7 CLOUDFLARENETUS European Union 27->147 159 6 other IPs or domains 27->159 109 C:\Users\...\tBgAB7sSACMGj4nLT9pECQbT.exe, PE32+ 27->109 dropped 111 C:\Users\...\jvF60qmheHCzC89aK2gdXrcC.exe, PE32 27->111 dropped 113 C:\Users\...\fFgtGZBzviuoQXlMwN1qvl4r.exe, PE32 27->113 dropped 119 12 other malicious files 27->119 dropped 207 Multi AV Scanner detection for dropped file 27->207 209 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->209 211 Creates HTML files with .exe extension (expired dropper behavior) 27->211 229 2 other signatures 27->229 121 2 other malicious files 32->121 dropped 48 11796175.exe 32->48         started        51 oldplayer.exe 32->51         started        115 C:\Users\...\8d0af54dc56e2d583e01b3564e27f6f8, SQLite 34->115 dropped 54 WerFault.exe 36->54         started        149 5.42.67.2 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 38->149 151 79.137.205.112 PSKSET-ASRU Russian Federation 38->151 153 190.219.153.101 CableOndaPA Panama 38->153 117 C:\Users\user\AppData\Roaming\vvedtcj, PE32 38->117 dropped 123 9 other malicious files 38->123 dropped 213 System process connects to network (likely due to code injection or exploit) 38->213 215 Benign windows process drops PE files 38->215 217 Hides that the sample has been downloaded from the Internet (zone.identifier) 38->217 57 rundll32.exe 38->57         started        59 rundll32.exe 38->59         started        61 rundll32.exe 38->61         started        125 2 other malicious files 40->125 dropped 63 v1490624.exe 40->63         started        155 157.254.164.98 BEANFIELDCA United States 42->155 219 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->219 221 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 42->221 223 Tries to steal Crypto Currency Wallets 42->223 157 176.123.9.85 ALEXHOSTMD Moldova Republic of 44->157 225 Tries to harvest and steal browser information (history, passwords, etc) 44->225 227 Tries to detect sandboxes / dynamic malware analysis system (file name check) 46->227 file13 signatures14 process15 dnsIp16 161 Multi AV Scanner detection for dropped file 48->161 163 Detected unpacking (changes PE section rights) 48->163 165 Machine Learning detection for dropped file 48->165 95 C:\Users\user\AppData\Local\...\oneetx.exe, PE32 51->95 dropped 139 52.168.117.173 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 54->139 97 C:\Users\user\AppData\Local\...\v9915285.exe, PE32 63->97 dropped 99 C:\Users\user\AppData\Local\...\c1365036.exe, PE32 63->99 dropped 65 v9915285.exe 63->65         started        file17 signatures18 process19 file20 91 C:\Users\user\AppData\Local\...\b0644675.exe, PE32 65->91 dropped 93 C:\Users\user\AppData\Local\...\a1852843.exe, PE32 65->93 dropped 68 a1852843.exe 65->68         started        process21 signatures22 197 Disable Windows Defender notifications (registry) 68->197 71 conhost.exe 68->71         started        process23
Threat name:
Win64.Adware.RedCap
Status:
Malicious
First seen:
2023-07-04 09:57:16 UTC
File Type:
PE+ (Exe)
Extracted files:
123
AV detection:
18 of 38 (47.37%)
Threat level:
  1/5
Verdict:
malicious
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader loader spyware stealer vmprotect
Behaviour
Suspicious behavior: EnumeratesProcesses
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
VMProtect packed file
PrivateLoader
Unpacked files
SH256 hash:
0cc7883198df53af5b4e7d6b14204ea5ab51066a52031f8f814cedccc491bd9a
MD5 hash:
2bd1a9096b78743f5236452b590afdd3
SHA1 hash:
5e2ccbbade58f7449cf17118b48c6184681ee591
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments