MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f31fcaa49855c3a40398e2e85604dc062bb4f51e538d689dad2851ea18760ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 4 YARA File information Comments

SHA256 hash: 0f31fcaa49855c3a40398e2e85604dc062bb4f51e538d689dad2851ea18760ab
SHA3-384 hash: Calculating hash
SHA1 hash: Calculating hash
MD5 hash: a1e656936816803eae447dfa8a500474
humanhash: Calculating hash
File name:a1e656936816803eae447dfa8a500474.exe
Download: download sample
Signature RedLineStealer
File size:11'302'069 bytes
First seen:2021-12-17 00:55:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash Calculating imphash
ssdeep Calculating ssdeep hash
Threatray 812 similar samples on MalwareBazaar
TLSH Calculating TLSH
telfhash Calculating telfhash
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
65.108.69.168:13293

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
65.108.69.168:13293 https://threatfox.abuse.ch/ioc/276365/
45.9.20.194:11452 https://threatfox.abuse.ch/ioc/276523/
45.9.20.221:2865 https://threatfox.abuse.ch/ioc/276909/
178.238.8.47:34210 https://threatfox.abuse.ch/ioc/276910/

Intelligence


File Origin
# of uploads :
1
# of downloads :
160
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
DNS request
Launching a process
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Creating a process with a hidden window
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 541332 Sample: 63BnQH6dHY.exe Startdate: 17/12/2021 Architecture: WINDOWS Score: 100 63 212.193.30.29, 49759, 80 SPD-NETTR Russian Federation 2->63 65 212.193.30.45, 49758, 80 SPD-NETTR Russian Federation 2->65 67 22 other IPs or domains 2->67 81 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->81 83 Found malware configuration 2->83 85 Antivirus detection for URL or domain 2->85 87 26 other signatures 2->87 10 63BnQH6dHY.exe 10 2->10         started        signatures3 process4 file5 53 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->53 dropped 13 setup_installer.exe 27 10->13         started        process6 file7 55 C:\Users\user\AppData\...\setup_install.exe, PE32 13->55 dropped 57 C:\Users\user\AppData\...\Mon22f545a94c37.exe, PE32 13->57 dropped 59 C:\Users\user\AppData\...\Mon22dc6f25b15d.exe, PE32 13->59 dropped 61 22 other files (16 malicious) 13->61 dropped 16 setup_install.exe 1 13->16         started        process8 signatures9 77 Adds a directory exclusion to Windows Defender 16->77 79 Disables Windows Defender (via service or powershell) 16->79 19 cmd.exe 1 16->19         started        21 cmd.exe 16->21         started        23 cmd.exe 16->23         started        25 6 other processes 16->25 process10 signatures11 28 Mon2209acde773.exe 19->28         started        31 Mon22d3edb49428ac7.exe 21->31         started        35 Mon224ca68c00ca8.exe 23->35         started        89 Adds a directory exclusion to Windows Defender 25->89 91 Disables Windows Defender (via service or powershell) 25->91 37 Mon22adb6fcc28265627.exe 2 25->37         started        39 Mon22c57c06075.exe 25->39         started        41 powershell.exe 26 25->41         started        43 powershell.exe 18 25->43         started        process12 dnsIp13 93 Multi AV Scanner detection for dropped file 28->93 95 Detected unpacking (changes PE section rights) 28->95 97 Machine Learning detection for dropped file 28->97 103 4 other signatures 28->103 69 one-mature-tube.me 172.67.171.87, 443, 49761, 49764 CLOUDFLARENETUS United States 31->69 45 9e27fc7d-254a-45f3-83da-351c8861af15.exe, PE32 31->45 dropped 47 791126d3-f801-47ce-bdde-232fb98b97b2.exe, PE32 31->47 dropped 49 7002b804-da89-40eb-8e36-b2da94d0745e.exe, PE32 31->49 dropped 51 2 other files (1 malicious) 31->51 dropped 71 iplogger.org 148.251.234.83, 443, 49762, 49763 HETZNER-ASDE Germany 35->71 73 www.listincode.com 149.28.253.196, 443, 49760 AS-CHOOPAUS United States 35->73 75 192.168.2.1 unknown unknown 35->75 99 May check the online IP address of the machine 35->99 101 Adds a directory exclusion to Windows Defender 37->101 file14 signatures15
Gathering data
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:socelars family:vidar botnet:03.12_build_3 botnet:915 aspackv2 discovery evasion infostealer spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://www.yarchworkshop.com/
https://mstdn.social/@sergeev43
https://koyu.space/@sergeev45
45.9.20.221:15590
Unpacked files
SH256 hash:
d5cc9ae263938f6b53b55115efac78ea1f56d11f6b0a3508b28c8775dadf58d7
MD5 hash:
d0072c6cc6960da68ee25165fc131870
SHA1 hash:
6f9d903f8460b223e06ba91acda797430b594d43
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
94d5b865f71529c3d4eb675d8c5c1a33d96435df4f1bd2b7ba722354ff5f8e39
MD5 hash:
9c7f8d3f2eeaaf7eda3f26a0a76bb72c
SHA1 hash:
c22b871dcd3dab1d3bf1244699360b61ad6fa268
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
da37723dbc887717a85940cdc3bda4a630d31e94a7af355558452a7c8d8ca5de
MD5 hash:
18f6ecc14ec6cbf833e7ab3dd31b5b36
SHA1 hash:
c2da6b4b158331a7f7bb9fa47f111e6fec7b8ecb
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
93d9ce6291eb10f727da27c487816b29fcba1b907d252f94d11ea0c3a99175fa
MD5 hash:
c7fc3bcb573b112eca27af5ef7192cce
SHA1 hash:
e43a907bdaced88d3c4444844e72d2381e9f1ad7
SH256 hash:
458aa4a5b8dcd292a5e07b404d60600b2f855786f9e78ea791ecabfc4644ec92
MD5 hash:
77478a9f5e0dd922a1d18c99824df4a1
SHA1 hash:
70d79fc395da3e5eac1cc2205bccbe6ffed1d052
SH256 hash:
4e3c72337ad6ede0f71934734ba639a39949c003d7943cb946ea4173b23fd0b7
MD5 hash:
88c2669e0bd058696300a9e233961b93
SHA1 hash:
fdbdc7399faa62ef2d811053a5053cd5d543a24b
SH256 hash:
f4dffedcb02405759d116009ec4535dd5dbcbc362cc0b0fd67f70962e03b8126
MD5 hash:
d11a9e7654f3fc3b8fc64a77ead89de9
SHA1 hash:
f2619cc2394b63d5259fd2c3daade06ec3dce52c
SH256 hash:
41287f3d12f50ccbd45bea42018c89a947f4f42c58fdb11014ec20f7138c7291
MD5 hash:
2bc9d13bd67fcccebaf19b4a865f73f1
SHA1 hash:
efa2339f992aca213c39b23156d6b79248ef6858
SH256 hash:
104f9a4559453eb97abc500b41be128a5ed9180a0171637cee4aed6e79170f21
MD5 hash:
4a49fb99149cf4b29990b3e3ca7c363f
SHA1 hash:
daefdf8438e156a04071814dcb6e25d8367eb46f
SH256 hash:
eedc6ea4c8ac8e8bc5b174271cbdbca451ae28b1b9fca988c3ea0b92cc9a33bb
MD5 hash:
e1052cd1d7a27c3a6088c12ccc4b14f4
SHA1 hash:
d575240875e1a86cea96f7f2c1862c8f7a39ca27
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
81446dd4a703e2548e3e3b0e73978ea7469c96271a03ebce4c7191e4357d8ba9
MD5 hash:
b0dd0cdd130906d7e4c3c45e4caa57a0
SHA1 hash:
cfac4be6ad48057fd7504278fddbe868691ba20e
SH256 hash:
88e1e488be9f679c9f2e3031f814e2a08101b0b90714f25089e574ce08c616de
MD5 hash:
55040e42d54008d835f17d101c4fdd48
SHA1 hash:
c3de18e57afa6e3e93f7fd6868da271fcafea471
SH256 hash:
c7c8f48e39521ed50a1c8468a445e7d82290a7986e10ba15e3b0c885429fd30c
MD5 hash:
e8d131ed97f2fa9ca4266483da7c2361
SHA1 hash:
9b45240cac88b8a643882f883790064ba8bde7ef
SH256 hash:
4832552a1196f12d3634b5800cff430a3a7b0dc00fd4cf926e57b8fbf3007d01
MD5 hash:
1ccce56ba6c65f2adfbb0dbdfd2f331b
SHA1 hash:
5b4b80f0a0e91aabc3b1f3e95599d5991e444963
SH256 hash:
53cd51a99aee14fe2dbdab711ba9f8f859de9819dab1b199c73321ed283e56bb
MD5 hash:
0bff8e4dc7ca1867a3e1790d857eba9d
SHA1 hash:
544c76063ef23a010d2e0eb80c3e540e1da176a3
SH256 hash:
50bad34e6aab1a803db34a6356ba9119b5db14b725dfe6d5ba2b3a87c6e3aa89
MD5 hash:
951b08c45b2a30c676f8d4ef34a06b38
SHA1 hash:
4a12a1ae4f86ae94fec46ac678345afbe7d99b7f
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
42b4d88be0aef7c02cf7d97eb837195ca9090b220c9f506c81bef8748d43ebd2
MD5 hash:
b8385947288689100c1da5303d4fb55f
SHA1 hash:
397291034d1cf1f45ee6a7e3de21583ce43629ed
SH256 hash:
8a4e7c07be9a87bb29c4f3d680fdb5669c1e9034a50d615c438ae9c059ed3306
MD5 hash:
450fa1d607290cd0884ffe9357b1ed76
SHA1 hash:
2ef8d557014bb41445820ff872ce00584c15c8f4
SH256 hash:
d413fa63b381188f8e3af92675db9edaf6495f82367cd8892c1a9b3827a64478
MD5 hash:
b7abfb2df8bdcd48649e6af3e823ae40
SHA1 hash:
2b682f7ccad36cb33dde0559e15767ca68257855
SH256 hash:
2a93372deb6f0605f375845720380f866fe0eecea899ca0c06c70cfa64cc4a93
MD5 hash:
75108a95a87c842b5df4a556be360458
SHA1 hash:
7aa74a8ba315480f32454df3a19c96684b726c6c
SH256 hash:
d51ab967ebe9743a94b1a8c25d6495b3f29ad5db65e8ff24fdccd3f4cf9468b3
MD5 hash:
a63ebf5064a9afb6bfdf62692c12a4ec
SHA1 hash:
d1a16d3e0da466448d3e653cc5bca7db7a42e312
SH256 hash:
a9ce388d6bf8993725554fd178640ac10d8a194194f4f09b31e0465b83a975b0
MD5 hash:
33b0faae2f9635e7650cde45e82a12ba
SHA1 hash:
0acbfbbf81760a70b05f617717eee9ff4b4aacdc
SH256 hash:
29aaca896f289f31e73942e8da00571d0a6f12f9ddd73d37355113ad8000f352
MD5 hash:
9f6f2bd249d18a6cbe50a39482bcacb2
SHA1 hash:
08e4c3333cae10cce343596b087445fbbb6a8b8a
SH256 hash:
de476bfaa3ea0a3020671f5f2b4dff493572fdb0c0be96f88f9d6c9454eb2ffa
MD5 hash:
71a3e5123d3cb5bfebf9384ded50a316
SHA1 hash:
dea0a2fdbda32e79c51d1130850adcd0175e26d0
SH256 hash:
1e89a0345485db077ea966c927f9f2b705d864f5310cf241b7bf73eaecb94d39
MD5 hash:
a552deabb8ed63c417cc24d883dc45ea
SHA1 hash:
1567e65e9b48c4b1054785d7b26df7af3d78b85a
SH256 hash:
e512c531f3a183f97ab70a88d72a314a9655fd80abf22d3ba0d3283837027567
MD5 hash:
e583f89bea0af513253d3bbc4717d677
SHA1 hash:
f231d5513b958450b57d62ac98a0ccf249cf3628
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
7d5c790d631378f55f96b9d88cff2f5e52f12df680a49278bd29cf8545ebc1d4
MD5 hash:
17795f7804e30b3ee92a0100d2795227
SHA1 hash:
ba213d48f76512d1d4c92222f5e74caaa5ce6a95
SH256 hash:
842705796d0459f3437e772056f82b87c698a0befd53b827dd361bfe8e6c8897
MD5 hash:
def15f2e3ba513cfb437f9e20feae17f
SHA1 hash:
e27f8b28a3f479387b88049b0992ed14499d4ece
SH256 hash:
9857fc5175a11b4b10766d8621223053ef9b931d639d945a89fdf35fa17335e4
MD5 hash:
33abd8132f31bbe6fce3c936e25f27c8
SHA1 hash:
dbb1a2a793cde2189a9f5d2220ced5b03cf9aa7c
SH256 hash:
7ad633895afc333434b78bd9601db5fdc6a8643ab49a6bd5e71cf3bcb3b1f7d6
MD5 hash:
cd2bf621507d498bb78b4cdfd9867bc7
SHA1 hash:
eda0688753587b72098fa93ebe2c3d1fd738cb2c
SH256 hash:
0f31fcaa49855c3a40398e2e85604dc062bb4f51e538d689dad2851ea18760ab
MD5 hash:
a1e656936816803eae447dfa8a500474
SHA1 hash:
2abb215ed52315d886899183fb719e669ae97110
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments