MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1adc68849d784b9530292b7187f492aa1d798d89a099a9eb8105fdfc9edaf2a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 4 File information Comments

SHA256 hash: 1adc68849d784b9530292b7187f492aa1d798d89a099a9eb8105fdfc9edaf2a0
SHA3-384 hash: be75f7bd66f027cc421b98f40786c63df662009e92c2af46b3134c6c7c70d3d0503475d57130ea6e77784008643d7268
SHA1 hash: d0b80542fbbb0dc859041e9b77a4758178fae0d2
MD5 hash: 7b4f872d9219ca50f7008712e72928d5
humanhash: bakerloo-arizona-bulldog-moon
File name:1ADC68849D784B9530292B7187F492AA1D798D89A099A.exe
Download: download sample
Signature RedLineStealer
File size:504'320 bytes
First seen:2022-10-24 20:25:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7f55fc0481fe939f858f6e3c9baf7b16 (12 x RedLineStealer, 1 x ArkeiStealer)
ssdeep 6144:sEQjNuySSrNn1eSwxEtSZHRx5ifNOlyjDw1P1sK5YTQqURjvwYTUoUm58t9deAOw:sTNPH6Ot2Hr5ifNOlIuRjwcL6LdeYS0
TLSH T1AFB49E01B9B3C0B3D5638AB1D57DD329203A7A141B2249EB6FC419B86EE03D16A71F77
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://78.47.204.168/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://78.47.204.168/ https://threatfox.abuse.ch/ioc/891320/

Intelligence


File Origin
# of uploads :
1
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
1ADC68849D784B9530292B7187F492AA1D798D89A099A.exe
Verdict:
Malicious activity
Analysis date:
2022-10-24 20:27:20 UTC
Tags:
trojan rat redline loader stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 729617 Sample: 1ADC68849D784B9530292B7187F... Startdate: 24/10/2022 Architecture: WINDOWS Score: 100 136 Snort IDS alert for network traffic 2->136 138 Malicious sample detected (through community Yara rule) 2->138 140 Antivirus detection for dropped file 2->140 142 10 other signatures 2->142 10 1ADC68849D784B9530292B7187F492AA1D798D89A099A.exe 1 2->10         started        13 svcupdater.exe 2->13         started        16 chrome.exe 2->16         started        18 chrome.exe 2->18         started        process3 dnsIp4 152 Contains functionality to inject code into remote processes 10->152 154 Writes to foreign memory regions 10->154 156 Allocates memory in foreign processes 10->156 158 Injects a PE file into a foreign processes 10->158 20 AppLaunch.exe 15 10 10->20         started        25 WerFault.exe 23 9 10->25         started        27 conhost.exe 10->27         started        29 WerFault.exe 10->29         started        118 clipper.guru 45.159.189.115, 49746, 80 HOSTING-SOLUTIONSUS Netherlands 13->118 160 Multi AV Scanner detection for dropped file 13->160 162 Machine Learning detection for dropped file 13->162 signatures5 process6 dnsIp7 104 79.137.192.7, 39946, 49700 PSKSET-ASRU Russian Federation 20->104 106 adigitalshop.com 151.106.122.215, 443, 49702 PLUSSERVER-ASN1DE Germany 20->106 108 2 other IPs or domains 20->108 86 C:\Users\user\AppData\Local\...\test.exe, PE32 20->86 dropped 88 C:\Users\user\AppData\Local\...\ofg.exe, PE32 20->88 dropped 90 C:\Users\user\AppData\Local\...\chrome.exe, MS-DOS 20->90 dropped 92 C:\Users\user\AppData\Local\...\brave.exe, PE32+ 20->92 dropped 144 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->144 146 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 20->146 148 Tries to harvest and steal browser information (history, passwords, etc) 20->148 150 Tries to steal Crypto Currency Wallets 20->150 31 chrome.exe 20->31         started        35 test.exe 20->35         started        37 ofg.exe 20->37         started        39 brave.exe 20->39         started        file8 signatures9 process10 file11 96 C:\WindowsbehaviorgraphoogleUpdate.exe, PE32 31->96 dropped 120 Multi AV Scanner detection for dropped file 31->120 122 Detected unpacking (changes PE section rights) 31->122 124 Machine Learning detection for dropped file 31->124 134 2 other signatures 31->134 41 GoogleUpdate.exe 31->41         started        58 3 other processes 31->58 126 Writes to foreign memory regions 35->126 128 Allocates memory in foreign processes 35->128 130 Injects a PE file into a foreign processes 35->130 45 vbc.exe 35->45         started        60 3 other processes 35->60 98 C:\Users\user\AppData\...\svcupdater.exe, PE32 37->98 dropped 48 cmd.exe 37->48         started        100 C:\Users\user\AppData\Local\Temp\419.tmp, PE32+ 39->100 dropped 102 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 39->102 dropped 132 Adds a directory exclusion to Windows Defender 39->132 50 cmd.exe 39->50         started        52 cmd.exe 39->52         started        54 powershell.exe 39->54         started        56 powershell.exe 39->56         started        signatures12 process13 dnsIp14 110 51.195.77.208, 443, 49706, 49708 OVHFR France 41->110 112 api.peer2profit.com 172.66.40.196, 443, 49705, 49707 CLOUDFLARENETUS United States 41->112 164 Detected unpacking (changes PE section rights) 41->164 166 Detected unpacking (overwrites its own PE header) 41->166 168 Uses netsh to modify the Windows network and firewall settings 41->168 170 Modifies the windows firewall 41->170 62 netsh.exe 41->62         started        70 2 other processes 41->70 114 t.me 149.154.167.99, 443, 49712 TELEGRAMRU United Kingdom 45->114 116 78.47.204.168, 49715, 80 HETZNER-ASDE Germany 45->116 94 C:\ProgramData\sqlite3.dll, PE32 45->94 dropped 172 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 45->172 174 Tries to harvest and steal browser information (history, passwords, etc) 45->174 176 DLL side loading technique detected 45->176 178 Tries to steal Crypto Currency Wallets 45->178 64 cmd.exe 45->64         started        180 Uses cmd line tools excessively to alter registry or file data 48->180 182 Uses schtasks.exe or at.exe to add and modify task schedules 48->182 184 Uses powercfg.exe to modify the power settings 48->184 72 2 other processes 48->72 74 8 other processes 50->74 186 Modifies power options to not sleep / hibernate 52->186 76 5 other processes 52->76 66 conhost.exe 54->66         started        68 conhost.exe 56->68         started        78 3 other processes 58->78 file15 signatures16 process17 process18 80 conhost.exe 62->80         started        82 conhost.exe 70->82         started        84 conhost.exe 70->84         started       
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-09-28 12:43:23 UTC
File Type:
PE (Exe)
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar botnet:1707 evasion infostealer spyware stealer upx
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Stops running service(s)
UPX packed file
Modifies security service
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
79.137.192.7:39946
https://t.me/slivetalks
https://c.im/@xinibin420
Unpacked files
SH256 hash:
cf5da3192d8d17cdf56b10c91b37fafaafb21690d128ed400a4e6c7184c714d6
MD5 hash:
82dff5dcef3f46709ba9b468e86df10d
SHA1 hash:
8c6a127ca761906be7d1683473ae319896eb4d4f
Detections:
redline
SH256 hash:
1adc68849d784b9530292b7187f492aa1d798d89a099a9eb8105fdfc9edaf2a0
MD5 hash:
7b4f872d9219ca50f7008712e72928d5
SHA1 hash:
d0b80542fbbb0dc859041e9b77a4758178fae0d2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments