MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d72c0d76801a1f047049dd202dd380af90f3e31d6801b1e7a5bc3c3e1d711d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 7 File information Comments

SHA256 hash: 1d72c0d76801a1f047049dd202dd380af90f3e31d6801b1e7a5bc3c3e1d711d2
SHA3-384 hash: 3be7c27b8167d756e68710b10631e65d184771f84d4a0801d071287b9783052b40b001b7477aad12cb79f0539fad3d4d
SHA1 hash: fa5afc82e3e31135ff4971901d826a22c95a8a24
MD5 hash: eefd6e1c185e49b48591f061e17ef3e1
humanhash: equal-triple-oxygen-steak
File name:eefd6e1c185e49b48591f061e17ef3e1.exe
Download: download sample
Signature RedLineStealer
File size:6'288'896 bytes
First seen:2021-11-23 11:27:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 98304:9CcVJOBD3ZRfwoM4TjcElTnjSb9Fgj9GeC+wykLXgaUtsb2NBIop7cN86dKva+mm:lvYDTNMMdL+Ij93VaXjD2NB3m86dKdAv
Threatray 4'523 similar samples on MalwareBazaar
TLSH T13E56F0B619A3961BB7A1EE766FFB390A8CD6BD135ED196CC20048393C5531C0C52E9CB
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://91.219.236.69/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.236.69/ https://threatfox.abuse.ch/ioc/253491/

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
EaseUS+Partition+Master+v16.5+(x64)+WinPE+Bootable+ISO.zip
Verdict:
Malicious activity
Analysis date:
2021-11-03 23:42:59 UTC
Tags:
evasion trojan loader opendir rat redline stealer vidar formbook danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Searching for synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Sending an HTTP GET request
Launching cmd.exe command interpreter
Creating a process with a hidden window
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Launching a tool to kill processes
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm mokes obfuscated packed razy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cookie Stealer Socelars
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has nameless sections
Sets debug register (to hijack the execution of another thread)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Cookie Stealer
Yara detected Socelars
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 527145 Sample: kq5Of3SOMZ.exe Startdate: 23/11/2021 Architecture: WINDOWS Score: 100 81 194.195.211.98 NEXINTO-DE Germany 2->81 83 23.35.236.56 ZAYO-6461US United States 2->83 85 9 other IPs or domains 2->85 121 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->121 123 Antivirus detection for URL or domain 2->123 125 Antivirus detection for dropped file 2->125 127 17 other signatures 2->127 10 kq5Of3SOMZ.exe 15 2->10         started        13 rundll32.exe 2->13         started        signatures3 process4 file5 71 C:\Users\user\AppData\...\window update.exe, PE32 10->71 dropped 73 C:\Users\user\AppData\Local\...\setup_2.exe, PE32 10->73 dropped 75 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 10->75 dropped 77 11 other malicious files 10->77 dropped 15 setup_2.exe 10->15         started        20 search_hyperfs_206.exe 8 10->20         started        22 chrome1.exe 14 4 10->22         started        26 5 other processes 10->26 24 rundll32.exe 13->24         started        process6 dnsIp7 87 5.188.88.216 PINDC-ASRU Russian Federation 15->87 89 194.87.138.114 MYLOC-ASIPBackboneofmyLocmanagedITAGDE Russian Federation 15->89 91 8.209.64.34 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 15->91 49 C:\Users\user\AppData\...\12546147728.exe, PE32 15->49 dropped 51 C:\Users\user\AppData\...\02685492717.exe, PE32 15->51 dropped 53 C:\Users\user\AppData\Local\...\null[1], PE32 15->53 dropped 61 6 other files (4 malicious) 15->61 dropped 101 Machine Learning detection for dropped file 15->101 103 Antivirus detection for dropped file 20->103 28 mshta.exe 19 20->28         started        93 iplogger.org 5.9.162.45, 443, 49746, 49752 HETZNER-ASDE Germany 22->93 95 www.google.com 172.217.168.68, 443, 49747 GOOGLEUS United States 22->95 55 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32+ 22->55 dropped 105 May check the online IP address of the machine 22->105 107 Writes to foreign memory regions 24->107 109 Allocates memory in foreign processes 24->109 111 Creates a thread in another existing process (thread injection) 24->111 30 svchost.exe 24->30 injected 97 104.21.51.48 CLOUDFLARENETUS United States 26->97 99 4 other IPs or domains 26->99 57 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 26->57 dropped 59 C:\Users\user\AppData\Local\...\setup.tmp, PE32 26->59 dropped 113 Multi AV Scanner detection for dropped file 26->113 115 Detected unpacking (changes PE section rights) 26->115 117 Obfuscated command line found 26->117 119 Creates processes via WMI 26->119 33 setup.tmp 26->33         started        37 conhost.exe 26->37         started        file8 signatures9 process10 dnsIp11 39 cmd.exe 28->39         started        133 System process connects to network (likely due to code injection or exploit) 30->133 135 Sets debug register (to hijack the execution of another thread) 30->135 137 Modifies the context of a thread in another process (thread injection) 30->137 79 192.168.2.1 unknown unknown 33->79 63 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 33->63 dropped 65 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 33->65 dropped 67 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 33->67 dropped file12 signatures13 process14 file15 69 C:\Users\user\AppData\...\kPBhgOaGQk.exe, PE32 39->69 dropped 42 kPBhgOaGQk.exe 39->42         started        45 conhost.exe 39->45         started        47 taskkill.exe 39->47         started        process16 signatures17 129 Antivirus detection for dropped file 42->129 131 Machine Learning detection for dropped file 42->131
Threat name:
ByteCode-MSIL.Backdoor.Mokes
Status:
Malicious
First seen:
2021-11-04 02:57:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
36 of 45 (80.00%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:cryptbot family:raccoon family:redline family:socelars botnet:9d8bdd517bb919d7e6a88c039aec14764fcfea4f botnet:mix23.11 discovery infostealer spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
CryptBot
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://www.hhgenice.top/
daqsml22.top
morkjm02.top
185.215.113.15:21508
Unpacked files
SH256 hash:
966f969746e82098cab4a7faafc099386e3d34567da419804a3193caae993664
MD5 hash:
fb805d7856d27640a79524de1163165d
SHA1 hash:
c38d82c8ae4eb104648fd05959991a74754f43b4
SH256 hash:
e4a015eafad3329ca800bcee4a82923db136e5561b0f8d38ea08c089362a62dc
MD5 hash:
577832cd7a4a5cd1b9bd0b69cab0e218
SHA1 hash:
e2228a6a2ffe9fdba8102796d9b5029c51b3a7df
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
7dce97154d24b9982361a37133e35aaf9106f3836bb48e27dd7daea568e75378
MD5 hash:
dd601e359de7b856efc57a630f90554e
SHA1 hash:
97995811c6bbb33ea6bf7cf808570dc6b15ed6e0
SH256 hash:
0efac9c1f24c44e5265ba1c8a80e0169d8b4aa6e8df218c524c57942c246f578
MD5 hash:
3d3b789155f41db5f058047d8e78a552
SHA1 hash:
c2f8488bf2c823bd165f1a41b53427ca1b24acb4
SH256 hash:
488627b7abcc72d8386950bbe1f1b75b1e6002979799c19719a1e01ebe8d990b
MD5 hash:
61b7df5454d9d885a97ec47f98ddd735
SHA1 hash:
2552100f175ffaa8647b91f6bc899276de4fd939
SH256 hash:
abf8388b7293fd17f2eed1ea1e843823a230a6154f18409bdfe7ffe71565188a
MD5 hash:
b2980f3ee1d987c5b0544b5265eeb160
SHA1 hash:
83fef487a13abeed13379f15394c32641893788a
SH256 hash:
de8e631b94bdba24047d766fcd355de768c318615f28860d93a258a39c1f6235
MD5 hash:
abdb5d806b24a7bdd01c003202de825d
SHA1 hash:
8c628037d9a3ca5c9a7e608a77c490197ba1d49a
SH256 hash:
913bb50c4003c19e4d25f3a15d2ec17fdc21f95f282b6f11a111e55d60e11812
MD5 hash:
3e9ff704da34b3232c795e80b68b292c
SHA1 hash:
8e7590057dd1d12d6e3bc0a73b24211e4ce24fa6
SH256 hash:
e25bf03288cdc9cb670664239a8c60a01b8737e8b3457e69ae3b07fa17807af3
MD5 hash:
608d42783dc008f9fe985051abd1a231
SHA1 hash:
aa013c40c9ef9dd6b5393bd167725992cfbf042e
SH256 hash:
460cd65ce2698135e30e978ea9e4048a015c34dd4284d735b0f7061e4b9c1a69
MD5 hash:
39bf3527ab89fc724bf4e7bc96465a89
SHA1 hash:
ac454fcd528407b2db8f2a3ad13b75e3903983bc
SH256 hash:
6e37e43b416e63857315f2947bad643dff237ecff65abfe3fcfb1be423212f6c
MD5 hash:
6a7c2d189c13ebe1d51193e369404a2a
SHA1 hash:
afeab0f853551d419118b6c7c44a645d57846397
SH256 hash:
d52c1130afab7a3baee1c096eaaf2d7c7ba100a270a42657c2f6b91b4ff879e9
MD5 hash:
8cfa6ba5f1646e7759ffcc6c61b8149e
SHA1 hash:
c847fcc31b150ea9a9a01c443873da48687e2485
SH256 hash:
f7593d3a5d3bbddab755e3896e3a6bdb90e4df2ed266d4fd5e1c61ee7f1caf6e
MD5 hash:
e362d7483f5f8149754daac1491f9744
SHA1 hash:
e31304e2a5163e698bfc55f9135903abb87a5d17
SH256 hash:
28db74d822fd3500417b4db7f8b4ac9ecc4f81a98a11864d763bd11979aa3d4c
MD5 hash:
9dc0d78426b6b5c38d7fcf86da312dd1
SHA1 hash:
38e9264432dc2878c91df7a950063fb810ec3972
SH256 hash:
1c38b1b5f88b0ed649f0cc53d54da625e9186cc438155eef1b0d226d12607b74
MD5 hash:
8f49f80d51a9b14533d65427b384bb79
SHA1 hash:
9e3aec0bdb7bef4767577194cb6a92d91f960c35
SH256 hash:
3cc9f00748917e25208d9c79a527208f96732ca54e9b3e01e18b6cae7c0c6f53
MD5 hash:
a9f1c095a080df7a008fd2b04f57c73b
SHA1 hash:
c7096f65671d61d9ddd8c5ae39103fdef40c850e
SH256 hash:
2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
MD5 hash:
2b342079303895c50af8040a91f30f71
SHA1 hash:
b11335e1cb8356d9c337cb89fe81d669a69de17e
SH256 hash:
a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
MD5 hash:
fbe295e5a1acfbd0a6271898f885fe6a
SHA1 hash:
d6d205922e61635472efb13c2bb92c9ac6cb96da
SH256 hash:
3cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea
MD5 hash:
ab101f38562c8545a641e95172c354b4
SHA1 hash:
ec47ac5449f6ee4b14f6dd7ddde841a3e723e567
SH256 hash:
1d72c0d76801a1f047049dd202dd380af90f3e31d6801b1e7a5bc3c3e1d711d2
MD5 hash:
eefd6e1c185e49b48591f061e17ef3e1
SHA1 hash:
fa5afc82e3e31135ff4971901d826a22c95a8a24
Malware family:
Raccoon v1.7.2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_DLInjector04
Author:ditekSHen
Description:Detects downloader / injector
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 1d72c0d76801a1f047049dd202dd380af90f3e31d6801b1e7a5bc3c3e1d711d2

(this sample)

  
Delivery method
Distributed via web download

Comments