MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e8cfcf628f5194908892cbd2cadc68e685bef5101a6230d0d71110c88d4a9ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 3 YARA 7 File information Comments

SHA256 hash: 0e8cfcf628f5194908892cbd2cadc68e685bef5101a6230d0d71110c88d4a9ac
SHA3-384 hash: 41b5514a903339539cab24a65aea09306aac12e8db38b3668acf07924bee8a4b7c6b0a81e1867ab0c007c80d847b9e88
SHA1 hash: 5db6a5a016449148fe73c00bb840ffc27f770ef6
MD5 hash: a9ad2c5948af7770c665d6e87b668090
humanhash: angel-tango-alpha-east
File name:a9ad2c5948af7770c665d6e87b668090.exe
Download: download sample
Signature RedLineStealer
File size:8'587'139 bytes
First seen:2021-10-02 15:30:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 196608:xp3a/EavTvJcRX3wSL7J1edzZjWWvMWF/Q2poGTa+8o5:xlaTqRX3f1e9jvMyneto5
Threatray 587 similar samples on MalwareBazaar
TLSH T12F863310BEC7CDF6C2412B356F141ED246B3D394212284AB277D1E6F99AD209F74A39E
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://185.215.113.45/g4MbvE/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.215.113.45/g4MbvE/index.php https://threatfox.abuse.ch/ioc/229555/
http://194.180.174.82/ https://threatfox.abuse.ch/ioc/229691/
185.51.246.132:31671 https://threatfox.abuse.ch/ioc/229743/

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a9ad2c5948af7770c665d6e87b668090.exe
Verdict:
No threats detected
Analysis date:
2021-10-02 15:33:50 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Result
Threat name:
Cryptbot Raccoon RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Costura Assembly Loader
Yara detected Cryptbot
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 495632 Sample: yT6sVqj4WT.exe Startdate: 02/10/2021 Architecture: WINDOWS Score: 100 63 194.180.174.82, 49814, 80 MIVOCLOUDMD unknown 2->63 65 teletop.top 104.21.17.146, 49813, 80 CLOUDFLARENETUS United States 2->65 67 24 other IPs or domains 2->67 87 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->87 89 Antivirus detection for URL or domain 2->89 91 Multi AV Scanner detection for dropped file 2->91 93 19 other signatures 2->93 10 yT6sVqj4WT.exe 22 2->10         started        signatures3 process4 file5 45 C:\Users\user\AppData\...\setup_install.exe, PE32 10->45 dropped 47 C:\Users\user\AppData\...\Fri12d5f91bf5.exe, PE32 10->47 dropped 49 C:\Users\user\...\Fri12cd9ce372c82.exe, PE32 10->49 dropped 51 17 other files (12 malicious) 10->51 dropped 13 setup_install.exe 1 10->13         started        process6 dnsIp7 83 hsiens.xyz 172.67.142.91, 49764, 80 CLOUDFLARENETUS United States 13->83 85 127.0.0.1 unknown unknown 13->85 123 Performs DNS queries to domains with low reputation 13->123 125 Adds a directory exclusion to Windows Defender 13->125 17 cmd.exe 13->17         started        19 cmd.exe 1 13->19         started        21 cmd.exe 13->21         started        23 13 other processes 13->23 signatures8 process9 signatures10 26 Fri128b3c17d6e5f.exe 17->26         started        31 Fri1204cccf85d6c94.exe 1 19->31         started        33 Fri122628685cbff6fd.exe 21->33         started        95 Adds a directory exclusion to Windows Defender 23->95 35 Fri122180577eb.exe 23->35         started        37 Fri1283b0f611d97de.exe 23->37         started        39 Fri122250b78d3a79.exe 23->39         started        41 9 other processes 23->41 process11 dnsIp12 69 194.145.227.161, 49780, 80 CLOUDPITDE Ukraine 26->69 75 5 other IPs or domains 26->75 53 C:\Users\user\AppData\Local\...\null[1], PE32 26->53 dropped 55 C:\Users\user\AppData\...\rollerkind2[1].exe, PE32 26->55 dropped 57 C:\Users\user\AppData\Local\...\null[1], PE32 26->57 dropped 61 10 other files (3 malicious) 26->61 dropped 97 May check the online IP address of the machine 26->97 99 Machine Learning detection for dropped file 26->99 101 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 26->101 77 3 other IPs or domains 31->77 103 Multi AV Scanner detection for dropped file 31->103 105 Tries to harvest and steal browser information (history, passwords, etc) 31->105 107 Tries to detect virtualization through RDTSC time measurements 31->107 109 Query firmware table information (likely to detect VMs) 33->109 111 Tries to detect sandboxes and other dynamic analysis tools (window names) 33->111 119 2 other signatures 33->119 121 3 other signatures 35->121 43 explorer.exe 35->43 injected 71 37.0.8.119, 49784, 49793, 49842 WKD-ASIE Netherlands 37->71 79 4 other IPs or domains 37->79 113 Disable Windows Defender real time protection (registry) 37->113 73 www.listincode.com 144.202.76.47, 443, 49767 AS-CHOOPAUS United States 39->73 115 Antivirus detection for dropped file 39->115 81 11 other IPs or domains 41->81 59 C:\Users\user\...\Fri125a255788501a1.tmp, PE32 41->59 dropped 117 Injects a PE file into a foreign processes 41->117 file13 signatures14 process15
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2021-09-18 04:21:57 UTC
AV detection:
28 of 45 (62.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:ani botnet:pab123 botnet:�u'h�y�����&s҈���kcc d�6�1�>�-� aspackv2 backdoor evasion infostealer stealer suricata themida trojan vmprotect
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Download via BitsAdmin
Kills process with taskkill
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M1
suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M2
suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M3
suricata: ET MALWARE Win32/Kryptik.HMCH Dropper User-Agent M4
Malware Config
C2 Extraction:
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.14.49.169:22411
https://dimonbk83.tumblr.com/
45.142.215.47:27643
Unpacked files
SH256 hash:
588626e5e2d07844f2b59eb51dce36bc8f6c123ceff817813bf4c31aebdd1bf5
MD5 hash:
8ecea1e237042ecd057de60e97b89e7a
SHA1 hash:
fb1a226b3c324c49d88ac6a6726f90641dc93977
SH256 hash:
0fd897b1e74f50e47526f974bf4906ecbe4a331b1ae4e2ec309fbee57a032586
MD5 hash:
4c3423a6e5e3337c71c551358f1334c1
SHA1 hash:
e3f59c4781ab6b19adb9eb85054a060b34c3df73
SH256 hash:
c02d2c9ae0b587f9b7631c443ce5a7d6d409c0a5d09ff6b389ca1330d44a1149
MD5 hash:
a91a81780273bb279790c1fbb6fb3105
SHA1 hash:
4bedae163300009aac8afa2c2b42ea6c184ca9dd
SH256 hash:
bc4bacc3b8b28d898f1671b79f216cca439f95eb60cd32d3e3ecafbecac42780
MD5 hash:
047bca47d9d12191811fb2e87cded3aa
SHA1 hash:
afdc5d27fb919d1d813e6a07466f889dbc8c6677
SH256 hash:
5f463952815ce4f763e9f4b3b72ed70ad82f74a69a271fc2b1588055c3fec4cc
MD5 hash:
21775ff041e7277d87aa8fdf1e09da6c
SHA1 hash:
6dd1d6716cb93adef6c9b39490a79e77fd5396c9
SH256 hash:
d1417ebebd174d666a6abc9481d65b39fc2d88559f7fd92ebb7e2f1ae93787db
MD5 hash:
70220a3ce6ffd34101b3770342505f2c
SHA1 hash:
b55c421634d8eeaec5c6193f34c04625d21a9ae9
SH256 hash:
79249202eec021c6d6c3f5732a55c635f501725ac61e20d27cce48adf109fdfd
MD5 hash:
75b02651b3d608848c0104c7e1adc038
SHA1 hash:
6337f93871c3480d06bfa76ccd3495b754781eed
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
333cb108a14125f609e50628e325ee48874fb38f79d3aa1ab05f9d51a6829b16
MD5 hash:
308b16fb154771e7276dc721e33597d3
SHA1 hash:
d1ae0e6d1d1bfb1fad9ac706464615bde85e362b
SH256 hash:
da6e2470414935131c3a094758be78605ec1c1ba8ddc755d175ac73763cc307a
MD5 hash:
03cd7541a32149209ecec14115466bc3
SHA1 hash:
bff67b407cffb1d3f3afbbcee15046e968204af3
SH256 hash:
3274005fc4effba965ad331a099fb01ef34218f7612512635cd178244ab3761c
MD5 hash:
ea7ae694330b551e0d282f1634737f1a
SHA1 hash:
b28eabbe05e93baee7b654b6c12b5665fed44db8
SH256 hash:
8109ce4f6e937530731141c0be96e6b0ffb703daf4595ffea44556101ce5f03b
MD5 hash:
76c54755f14a21d92a85a717620452bf
SHA1 hash:
93a635b272b67b7c326ec333d23029698b4ffeb3
SH256 hash:
1fd2e17f4c02bd2c83b51f54f6abf8e5dff6f7c2106e9a3648e41fd961961e98
MD5 hash:
c1e9bd5955a20911a589f9a1a4a17d6b
SHA1 hash:
8dfa543969a1dc6de00c3651edcbf8dd587c9c6e
SH256 hash:
c583c3f2345654957827ee152d29ce87a374c27bac4d90d052b9fec83131ac7c
MD5 hash:
e1eea9b88a4c828217215028196518e5
SHA1 hash:
72779b0a61e2f42aa10b0de3c4cd1460b9ce13b6
SH256 hash:
52701e2808de643baf6789222e4c2422cca70733222cd2e6d0b9f36a4f6eeabc
MD5 hash:
71a718d5f6f6a69ce1e844fec2a06f53
SHA1 hash:
5e3d339c99bb37e485eeadb71c9aa72a8e06fdab
SH256 hash:
2f74ece678bdec08b4bdfee5a084d109e6f5adc42a12ae8ecce95c09ff12d0ae
MD5 hash:
a8133374add8bcc44638a1fd2b5e8172
SHA1 hash:
3f3062a3c233fe434011106775e8baea466a6a75
SH256 hash:
3dcf1c5cb1b65d5d59edcc8c7d5b521ee27f26c996cefcf6f9ff4d9e05adcbe4
MD5 hash:
0ab03929e4442a16dba9c5a82feadd96
SHA1 hash:
3f191602955d9254ace5a88d91cab1bdf622c324
SH256 hash:
147c89071ccbb5790a9c81acdbe5975f96dc130866e7dda2f299dc7e8528205f
MD5 hash:
d1f3309c8b6896b1bfc93153baedb2ee
SHA1 hash:
3522c85609d8e6926e982daf604d90050b3c9da4
SH256 hash:
e723202408260802edaa3d7068061214f80053b813ccbc92a8e3d33570fff4a4
MD5 hash:
49ed94edea7d0eaa33e9ccc0d2f7488b
SHA1 hash:
31e3f5177e3e17a7611e0218a8d01cc4b80e91df
SH256 hash:
60c2bb10465d00632f49101774d1592a898722080e2f5fef336e045be9259f68
MD5 hash:
90b9df8e6a96b5862d95a5e41f848848
SHA1 hash:
2152867746ed01c0532009590220cee9150d2380
SH256 hash:
36d5afdcb0fa8d512656aa5a59f34018885bb1b9dd5cc0780766552809cfb45f
MD5 hash:
4f9c74430d72b9500a0d99cc28fc7a7e
SHA1 hash:
a67cf6a62a6cabec501aa2f14e97c48b71dbd97c
SH256 hash:
c598a971f1d8bc58362396b10df4359654354e6c7b1b56741cea2a532e9bdd94
MD5 hash:
3367116dc59fc2b806bb5ec8c36bf2b6
SHA1 hash:
f4fb01a1efff6c7969383ccf7f64e4ac8cfc2c6f
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
cd79062f5de3b7ce8df686816120f13f4c6b048d5500afcc1c2bbb0dd1b5f6da
MD5 hash:
75a9629a0e41984b4cde9f2c92ae1f42
SHA1 hash:
34e93a98af7289382be1f8d953096061d9c854ac
SH256 hash:
86a352628dea7ac352e6cfdeaf3b335ffeb81bea2ac4f2ff0d2217f920e01c41
MD5 hash:
a905a86f07742e58cac582cd1e8d6d7f
SHA1 hash:
1ac748c0b20445437f357120ff76d0a25d8b0120
SH256 hash:
d255a6e612bff76fa1df6ffcabcd54e262588b1f3428c3e0eb771a8a60fdfc6a
MD5 hash:
e8937f6410d5c3ce59bb64e0be25d31e
SHA1 hash:
3c40bdaf3189120ef36cab0bc243f1c80f969d04
SH256 hash:
db956855f3137df6e5f1fccb5a69edd98dff0858b9f04a294f011d373b6ecdac
MD5 hash:
4a61af6e32a6d7ed79d8cca4c3e68cf3
SHA1 hash:
c7a697361ef3aba59ca0a9d01e52bd0a96093dcb
SH256 hash:
00fcd5b83c00ecf885bc3efdd6f49071f4e20b8042bca1f5517b9f5d4ed28a19
MD5 hash:
792e4321b5be90cedf02d491277fb316
SHA1 hash:
41a8a80594dbef973164d71ac2aa1eba3050e84b
Detections:
win_socelars_auto
SH256 hash:
0e8cfcf628f5194908892cbd2cadc68e685bef5101a6230d0d71110c88d4a9ac
MD5 hash:
a9ad2c5948af7770c665d6e87b668090
SHA1 hash:
5db6a5a016449148fe73c00bb840ffc27f770ef6
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments