MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d5b29148871620c11ceb9d8e710d964e63c38185c0c0cae63d55287619423bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 0d5b29148871620c11ceb9d8e710d964e63c38185c0c0cae63d55287619423bd
SHA3-384 hash: a75c10de0acc437e1bc252992694bbe2bb173b6d32da12f9dc0ee6f2b06dadb88fe6ad541dd3a1cf761aa55b65bf6f56
SHA1 hash: cbade2f4b8eafbea78c2499cc411cca1df33220c
MD5 hash: cc2c6afe6d0d346f2142ff00cb248964
humanhash: yankee-white-arizona-arizona
File name:0d5b29148871620c11ceb9d8e710d964e63c38185c0c0cae63d55287619423bd
Download: download sample
Signature RecordBreaker
File size:6'427'554 bytes
First seen:2022-07-25 22:21:27 UTC
Last seen:2022-07-27 17:27:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ab9ff6e4872ea2766a5f5c6af5649e9d (20 x CryptOne, 13 x RedLineStealer, 6 x RecordBreaker)
ssdeep 196608:WJ3No8JSuBgVv5WzOfHlIjaMos14V5RnDrW/:goZygjWzOvy7osiV5Rn2/
TLSH T1E75633D679C3C7BDE02187B5FAA262506DA969211773C98BC700253E1FF3190EB2B653
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon e0964a6969b89ee0 (1 x RecordBreaker)
Reporter crep1x
Tags:exe recordbreaker vidar

Intelligence


File Origin
# of uploads :
2
# of downloads :
436
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %AppData% directory
Creating a file
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a browser process
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Tandem Espionage
Verdict:
Malicious
Result
Threat name:
Nitol, RedLine
Detection:
malicious
Classification:
bank.troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected VMProtect packer
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically)
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected Nitol
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 673230 Sample: 72JrEIo9FX Startdate: 26/07/2022 Architecture: WINDOWS Score: 100 124 Snort IDS alert for network traffic 2->124 126 Multi AV Scanner detection for domain / URL 2->126 128 Malicious sample detected (through community Yara rule) 2->128 130 11 other signatures 2->130 9 72JrEIo9FX.exe 15 2->9         started        12 rundll32.exe 2->12         started        14 oZSEE0HVJFONXbxt.exe 2->14         started        process3 file4 98 C:\Users\user\AppData\Local\...\lakos.exe, PE32 9->98 dropped 100 C:\Users\user\AppData\Local\...\filee.exe, PE32 9->100 dropped 102 C:\Users\user\AppData\Local\Temp\...\file.exe, PE32 9->102 dropped 104 4 other malicious files 9->104 dropped 17 file.exe 17 9->17         started        22 filee.exe 9->22         started        24 License Keys.exe 2 9->24         started        26 rundll32.exe 12->26         started        172 Writes to foreign memory regions 14->172 174 Allocates memory in foreign processes 14->174 176 Creates a thread in another existing process (thread injection) 14->176 178 Injects a PE file into a foreign processes 14->178 28 iOkAmvlellx.exe 14->28 injected 30 iOkAmvlellx.exe 14->30 injected 32 iOkAmvlellx.exe 14->32 injected 34 iOkAmvlellx.exe 14->34 injected signatures5 process6 dnsIp7 106 yesilyasam.eu 185.175.200.64, 443, 49766, 49767 ASTRALUSNL Netherlands 17->106 82 C:\Users\user\AppData\Roaming\00004823..exe, PE32 17->82 dropped 84 C:\Users\user\AppData\Roaming\00000029..exe, PE32 17->84 dropped 86 C:\Users\user\AppData\Local\...\fw4[1].exe, PE32 17->86 dropped 88 C:\Users\user\AppData\Local\...\fw3[1].exe, PE32 17->88 dropped 132 Multi AV Scanner detection for dropped file 17->132 36 00004823..exe 1 17->36         started        40 00000029..exe 15 11 17->40         started        43 cmd.exe 17->43         started        134 Machine Learning detection for dropped file 22->134 45 License Keys.exe 3 24->45         started        47 conhost.exe 24->47         started        136 Writes to foreign memory regions 26->136 138 Allocates memory in foreign processes 26->138 140 Creates a thread in another existing process (thread injection) 26->140 49 svchost.exe 26->49 injected 51 svchost.exe 26->51 injected 53 svchost.exe 26->53 injected 55 5 other processes 26->55 file8 signatures9 process10 dnsIp11 90 C:\Users\user\...\oZSEE0HVJFONXbxt.exe, PE32 36->90 dropped 142 Antivirus detection for dropped file 36->142 144 Drops PE files to the startup folder 36->144 146 Writes to foreign memory regions 36->146 162 3 other signatures 36->162 57 iOkAmvlellx.exe 36->57 injected 59 iOkAmvlellx.exe 36->59 injected 61 iOkAmvlellx.exe 36->61 injected 76 4 other processes 36->76 108 87.251.77.179, 49781, 80 HOSTKEY-ASNL Russian Federation 40->108 110 192.168.2.1 unknown unknown 40->110 148 Machine Learning detection for dropped file 40->148 150 Tries to harvest and steal browser information (history, passwords, etc) 40->150 152 Tries to steal Crypto Currency Wallets 40->152 154 Uses ping.exe to check the status of other devices and networks 43->154 63 PING.EXE 43->63         started        66 conhost.exe 43->66         started        112 v.xyzgamev.com 104.21.40.196, 443, 49765 CLOUDFLARENETUS United States 45->112 114 172.67.188.70, 443, 49771 CLOUDFLARENETUS United States 45->114 92 C:\Users\user\AppData\Local\Temp\db.dll, PE32 45->92 dropped 68 conhost.exe 45->68         started        70 cmd.exe 47->70         started        156 System process connects to network (likely due to code injection or exploit) 49->156 158 Sets debug register (to hijack the execution of another thread) 49->158 160 Modifies the context of a thread in another process (thread injection) 49->160 72 svchost.exe 49->72         started        file12 signatures13 process14 dnsIp15 116 127.0.0.1 unknown unknown 63->116 78 conhost.exe 70->78         started        80 timeout.exe 70->80         started        118 toa.mygametoa.com 34.64.183.91 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 72->118 120 208.95.112.1 TUT-ASUS United States 72->120 122 104.21.34.132 CLOUDFLARENETUS United States 72->122 94 C:\Users\user\AppData\Local\...\Login Data.db, SQLite 72->94 dropped 96 C:\Users\user\AppData\Local\...\Cookies.db, SQLite 72->96 dropped 164 Query firmware table information (likely to detect VMs) 72->164 166 Installs new ROOT certificates 72->166 168 Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically) 72->168 170 Tries to harvest and steal browser information (history, passwords, etc) 72->170 file16 signatures17 process18
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-07-25 22:22:24 UTC
File Type:
PE (Exe)
Extracted files:
95
AV detection:
23 of 26 (88.46%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:eternity family:redline botnet:4 botnet:@hashcats botnet:@tag12312341 botnet:nam3 botnet:vukong collection discovery infostealer persistence spyware stealer vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Drops file in System32 directory
Accesses 2FA software files, possible credential harvesting
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detects Eternity stealer
Eternity
Process spawned unexpected child process
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
15.235.171.56:30730
185.106.92.226:40788
103.89.90.61:18728
31.41.244.134:11643
62.204.41.144:14096
http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion
Unpacked files
SH256 hash:
49005d06c933c3a49b506911e95483128f438202e842d25b7407e8d17cd880a4
MD5 hash:
7411a61bb1ebd3535cd876aabb03095e
SHA1 hash:
d7652e4f830e4c605b2c8a03e24a2f028bd8d2cd
SH256 hash:
6e1ded79930aee174d2610ed7de34f4bdcdf81447dcc0de6260cc757a3260a2f
MD5 hash:
cbf7c47477397f723b0a712d33445bdb
SHA1 hash:
5f46d41667730fdb1fbba2b19a57dd06481d0244
SH256 hash:
0d5b29148871620c11ceb9d8e710d964e63c38185c0c0cae63d55287619423bd
MD5 hash:
cc2c6afe6d0d346f2142ff00cb248964
SHA1 hash:
cbade2f4b8eafbea78c2499cc411cca1df33220c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments