MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23c30d4d176ded055abf529bf8c75bc1e0f7656072f6a2a4ac8ad7d9f889fedc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



N-W0rm


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 4 File information Comments

SHA256 hash: 23c30d4d176ded055abf529bf8c75bc1e0f7656072f6a2a4ac8ad7d9f889fedc
SHA3-384 hash: 09fef8ee7257eb365199ae75c68a9d4f26618cce1a3bbab51e989a8967cc34e404104cb85a9ae5e05e6307ec95ee42d8
SHA1 hash: 784d1ecca63351ee4b84d59bcbb7253d44216784
MD5 hash: a8246d9b175683a8621e6b31d855a59b
humanhash: delta-michigan-mockingbird-lithium
File name:a8246d9b175683a8621e6b31d855a59b.exe
Download: download sample
Signature N-W0rm
File size:546'760 bytes
First seen:2022-05-28 15:06:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7f3ac4b9d26098d4cd7c621516ede92d (1 x N-W0rm)
ssdeep 12288:9+DtV1RO5HhXukEzsa4BV9b8AeWQd3tuab7xRS/7vpzigr:9+DtV8nEoaEn8AeW+34gI7x7r
Threatray 570 similar samples on MalwareBazaar
TLSH T16FC417A3D742D21FE2633474C05DA6B6A01627307A024897B754AFFDE73C2D28A79B53
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe N-W0rm


Avatar
abuse_ch
N-W0rm C2:
185.106.92.75:7171

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.106.92.75:7171 https://threatfox.abuse.ch/ioc/643052/

Intelligence


File Origin
# of uploads :
1
# of downloads :
308
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
a8246d9b175683a8621e6b31d855a59b.exe
Verdict:
Malicious activity
Analysis date:
2022-05-28 15:08:36 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Moving a system file
Stealing user critical data
Unauthorized injection to a recently created process
Setting a single autorun event
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe greyware overlay packed pandora redline
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
MicroClip, RedLine
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Drops PE files with benign system names
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Potential dropper URLs found in powershell memory
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected MicroClip
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 635665 Sample: cDJSg6EMH7.exe Startdate: 29/05/2022 Architecture: WINDOWS Score: 100 71 Snort IDS alert for network traffic 2->71 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 11 other signatures 2->77 9 cDJSg6EMH7.exe 1 2->9         started        12 fl.exe 2->12         started        14 fl.exe 2->14         started        process3 signatures4 87 Writes to foreign memory regions 9->87 89 Allocates memory in foreign processes 9->89 91 Injects a PE file into a foreign processes 9->91 16 AppLaunch.exe 15 8 9->16         started        21 conhost.exe 9->21         started        process5 dnsIp6 65 185.106.92.75, 49747, 7171 SUPERSERVERSDATACENTERRU Russian Federation 16->65 67 transfer.sh 144.76.136.153, 443, 49758, 49759 HETZNER-ASDE Germany 16->67 57 C:\Users\user\AppData\Local\Temp\fl.exe, PE32+ 16->57 dropped 59 C:\Users\user\AppData\...\WindowsDefender.exe, PE32+ 16->59 dropped 79 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->79 81 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->81 83 Tries to harvest and steal browser information (history, passwords, etc) 16->83 85 Tries to steal Crypto Currency Wallets 16->85 23 WindowsDefender.exe 6 16->23         started        28 fl.exe 1 16->28         started        file7 signatures8 process9 dnsIp10 69 192.168.2.1 unknown unknown 23->69 61 C:\Program Files\Windows\services.exe, PE32+ 23->61 dropped 63 C:\Windows\System32\drivers\etc\hosts, ASCII 23->63 dropped 93 Multi AV Scanner detection for dropped file 23->93 95 Machine Learning detection for dropped file 23->95 97 Modifies the hosts file 23->97 99 Drops PE files with benign system names 23->99 30 cmd.exe 1 23->30         started        33 cmd.exe 23->33         started        35 cmd.exe 23->35         started        37 cmd.exe 23->37         started        file11 signatures12 process13 signatures14 101 Uses cmd line tools excessively to alter registry or file data 30->101 103 Encrypted powershell cmdline option found 30->103 105 Uses schtasks.exe or at.exe to add and modify task schedules 30->105 107 Uses powercfg.exe to modify the power settings 30->107 39 powershell.exe 19 30->39         started        41 conhost.exe 30->41         started        43 conhost.exe 33->43         started        45 sc.exe 33->45         started        47 sc.exe 33->47         started        51 7 other processes 33->51 109 Modifies power options to not sleep / hibernate 35->109 49 conhost.exe 35->49         started        53 4 other processes 35->53 55 2 other processes 37->55 process15
Gathering data
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-05-22 13:15:04 UTC
File Type:
PE (Exe)
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig discovery evasion exploit infostealer miner persistence spyware suricata
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies registry key
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
Modifies file permissions
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Possible privilege escalation attempt
Stops running service(s)
XMRig Miner Payload
Modifies security service
RedLine
RedLine Payload
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
xmrig
Malware Config
C2 Extraction:
185.106.92.75:7171
Unpacked files
SH256 hash:
f086ff164ec0e0779ea5ef95c15183943948af2c3b12083e95874056bb8006b2
MD5 hash:
55c1728a368b3eac11e5caecf8dbc92e
SHA1 hash:
6e1a3e332e7c90c2201cac77264cc793ea222b01
SH256 hash:
23c30d4d176ded055abf529bf8c75bc1e0f7656072f6a2a4ac8ad7d9f889fedc
MD5 hash:
a8246d9b175683a8621e6b31d855a59b
SHA1 hash:
784d1ecca63351ee4b84d59bcbb7253d44216784
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments