MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19cc75c62f3ebb4e7444e3d29e4dcd1c6d43dae4c390e8102cce2db9f19fce15. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 2 YARA 6 File information Comments

SHA256 hash: 19cc75c62f3ebb4e7444e3d29e4dcd1c6d43dae4c390e8102cce2db9f19fce15
SHA3-384 hash: 410c9840fc1b0f483f0514f7be906c850213734ffc8d9ddd537f5b1b0bc728b4996a9d5392c03e7726ee2be18de39e62
SHA1 hash: fc1a066b9ffa79923dceff062ec3954b95c6dd2c
MD5 hash: 8c14f0315734ff02c47cd264396e57a7
humanhash: mango-alaska-robin-seventeen
File name:19CC75C62F3EBB4E7444E3D29E4DCD1C6D43DAE4C390E.exe
Download: download sample
Signature RedLineStealer
File size:3'688'447 bytes
First seen:2021-10-03 23:20:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:ycKtmqhPy1lqx7YDyFn0uY0ZafTMCZ/MvethKM2YTau:yH8qhPNYDqK0ARlhxZau
Threatray 587 similar samples on MalwareBazaar
TLSH T1A9063304524C519AE012F3F8DFB987CC744A23A0D8E53367E6B196DF2CAED493B946E4
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.156.27.227:56326

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.156.27.227:56326 https://threatfox.abuse.ch/ioc/230019/
195.2.93.217:59309 https://threatfox.abuse.ch/ioc/230020/

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
19CC75C62F3EBB4E7444E3D29E4DCD1C6D43DAE4C390E.exe
Verdict:
No threats detected
Analysis date:
2021-10-03 23:22:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 495971 Sample: 19CC75C62F3EBB4E7444E3D29E4... Startdate: 04/10/2021 Architecture: WINDOWS Score: 100 76 149.154.167.99 TELEGRAMRU United Kingdom 2->76 78 52.168.117.173 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->78 80 6 other IPs or domains 2->80 102 Antivirus detection for URL or domain 2->102 104 Antivirus detection for dropped file 2->104 106 Multi AV Scanner detection for dropped file 2->106 108 13 other signatures 2->108 11 19CC75C62F3EBB4E7444E3D29E4DCD1C6D43DAE4C390E.exe 10 2->11         started        14 svchost.exe 2->14         started        17 svchost.exe 2->17         started        19 2 other processes 2->19 signatures3 process4 file5 74 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->74 dropped 21 setup_installer.exe 16 11->21         started        132 Changes security center settings (notifications, updates, antivirus, firewall) 14->132 signatures6 process7 file8 56 C:\Users\user\AppData\...\setup_install.exe, PE32 21->56 dropped 58 C:\Users\user\AppData\...\Tue23cd64d60a5c.exe, PE32 21->58 dropped 60 C:\Users\user\...\Tue239401d669773.exe, PE32 21->60 dropped 62 11 other files (4 malicious) 21->62 dropped 24 setup_install.exe 1 21->24         started        process9 dnsIp10 96 104.21.87.76 CLOUDFLARENETUS United States 24->96 98 127.0.0.1 unknown unknown 24->98 130 Adds a directory exclusion to Windows Defender 24->130 28 cmd.exe 24->28         started        30 cmd.exe 1 24->30         started        32 cmd.exe 24->32         started        34 7 other processes 24->34 signatures11 process12 signatures13 37 Tue2385d3a4fc.exe 28->37         started        42 Tue239401d669773.exe 30->42         started        44 Tue2306d172d6d40c.exe 32->44         started        100 Adds a directory exclusion to Windows Defender 34->100 46 Tue23cd64d60a5c.exe 34->46         started        48 Tue23018eb3971a67a8.exe 34->48         started        50 Tue2393db3958.exe 34->50         started        52 3 other processes 34->52 process14 dnsIp15 82 37.0.10.214 WKD-ASIE Netherlands 37->82 88 10 other IPs or domains 37->88 64 C:\Users\...\vGUULYFlC1DdvBBoIzo2cidl.exe, PE32 37->64 dropped 66 C:\Users\...\o6mBLhLByTOf_iabDcWQQ1bf.exe, PE32 37->66 dropped 68 C:\Users\...\lyeT4ZwpxEmFOZ_zI0jKFMC0.exe, PE32 37->68 dropped 72 29 other files (23 malicious) 37->72 dropped 110 Drops PE files to the document folder of the user 37->110 112 Creates HTML files with .exe extension (expired dropper behavior) 37->112 114 Machine Learning detection for dropped file 37->114 116 Disable Windows Defender real time protection (registry) 37->116 118 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 42->118 120 Maps a DLL or memory area into another process 42->120 122 Checks if the current machine is a virtual machine (disk enumeration) 42->122 90 2 other IPs or domains 44->90 124 Antivirus detection for dropped file 44->124 126 Detected unpacking (overwrites its own PE header) 44->126 84 162.159.129.233 CLOUDFLARENETUS United States 46->84 92 4 other IPs or domains 48->92 70 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 48->70 dropped 128 Tries to harvest and steal browser information (history, passwords, etc) 48->128 94 2 other IPs or domains 50->94 86 185.92.73.84 FOXCLOUDNL Netherlands 52->86 54 Tue23923d520ac4.exe 52->54         started        file16 signatures17 process18
Threat name:
Win32.Downloader.Upatre
Status:
Malicious
First seen:
2021-08-25 14:50:29 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pub2 aspackv2 backdoor discovery evasion infostealer spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
185.92.73.84:80
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
9b5923d26248adde4546d4421275f7b0ac36e4e2c4af232d367563bca7cf5209
MD5 hash:
3093c62cf5c8c754576a62c8d173b11c
SHA1 hash:
468210c7bc85627a27a2b10da0580c119e0ec3d8
SH256 hash:
59c8b228088a6a89dfd12a9f2ee3b4b35ba5c11d22917e4794c8c40f607ccf12
MD5 hash:
594093a4765e2444ce9f5b064dc857ef
SHA1 hash:
32e65e3bf804a2abfa94281933fd5b5a0d23a30d
SH256 hash:
771879a5daba9c1534171c0c3179008c0fde3629582b4c9412a10ee2d50b627a
MD5 hash:
ae0845f56193eedc564b4a1bf6bb3b74
SHA1 hash:
119c61acd1499c1e06409a9405c0605f92255764
SH256 hash:
60477c5c0c4033440c08c3e4f25c369abe008468c7f2423333ad28f0ca41ae3c
MD5 hash:
af605ceb0187675657f0425c40c32d31
SHA1 hash:
ac7dd722fab4b8d7c47f7e4bbd27ea79eb98427a
SH256 hash:
bb96136d3dc584b776fd7f67d30dfc21a5113f2d31011ea107bc216a9e70755f
MD5 hash:
d729d6dfd720d64e2edcfa2b265c9563
SHA1 hash:
a1f1fe6d49c8b390cd7e01b0384a4cbc29539b4b
SH256 hash:
785f25b675bf841ef74c654869148a7a52043dc4f0a9b47411d56a7a653acfbc
MD5 hash:
c2845189a6070d89ce34799753823b63
SHA1 hash:
95cc359e043d7aa6b32e1b5f02bfeda413c6aac2
SH256 hash:
05942fe67632d7cb440fd1f31bd55cfc8416bdab4da6ed8d84e8d3fd16c3f5d6
MD5 hash:
5fbf56cf05175a08ebbfd3ab8c29ab9e
SHA1 hash:
7412ee83a7568b1f6024ba4e1277e298d76e8738
SH256 hash:
e6dce7d1ee0bbc5da1d5f17796fe94daf3235d1a01bf5add8ba0df98752863c0
MD5 hash:
e6db3b05b789c394371672701ea696a8
SHA1 hash:
389c9e423d3d72ad8acf4b37f1550f83b19286a2
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
f586526445fbf4582a48736d66690487758b9a1c334845d722efac08e8cbc5af
MD5 hash:
3a75399e3f0fc10815f1ab8460040ea3
SHA1 hash:
598b7c63c8426273550369ad1140fd73b6870b6b
SH256 hash:
feb9283f0d1da2d21b459a3b3197ab71eff4e8fedcf58c60b25aa62d1d963652
MD5 hash:
d032030ed03ee2db63d0d1cadaf1f602
SHA1 hash:
edc19f842fed62452665d216800a5d65b0c57867
SH256 hash:
f4939caed770cf8a4a32417ee43a362bded575150c34593b642ab68d3db6baad
MD5 hash:
cbd26790c524ae7d051077c49d9dd783
SHA1 hash:
a7a913bd88c918c9e6a3d760fcdb21b54ec9bf36
SH256 hash:
19cc75c62f3ebb4e7444e3d29e4dcd1c6d43dae4c390e8102cce2db9f19fce15
MD5 hash:
8c14f0315734ff02c47cd264396e57a7
SHA1 hash:
fc1a066b9ffa79923dceff062ec3954b95c6dd2c
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments