MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 25b910d56003eca83f175318e3245c5bbcb83058cd570c64078a02948e87be7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 25b910d56003eca83f175318e3245c5bbcb83058cd570c64078a02948e87be7c
SHA3-384 hash: b73562b2409e2383dad33767887797b728f80b235899e2aaabcc267df221dc573a43836852686d23f97294309cd9ff0a
SHA1 hash: f7bcba55863f96df3ebcc3180af9be52b5eac2ca
MD5 hash: ba9266e00d09ce9ea5c05cdae8cfa527
humanhash: low-oklahoma-north-spaghetti
File name:25b910d56003eca83f175318e3245c5bbcb83058cd570.exe
Download: download sample
Signature RedLineStealer
File size:1'455'616 bytes
First seen:2023-11-11 17:25:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:xyBYUwmJIvlr9eDIs11aGVbyD9jAvbKuLyVEsZrbRzKO7U6OdGvPz:kRwmJuzesMoGoivdyqmrbRzAG
Threatray 1'862 similar samples on MalwareBazaar
TLSH T11C6523837DEC8162E6B9233094FF0A970A36BD365D3DC72B3949AC0A4972790197537B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
195.10.205.16:1056

Intelligence


File Origin
# of uploads :
1
# of downloads :
334
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Behavior that indicates a threat
Searching for the browser window
Searching for the window
DNS request
Sending a custom TCP request
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer lolbin lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, Mystic Stealer, RedLine, Smoke
Detection:
malicious
Classification:
phis.troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Phishing site detected (based on logo match)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Stop multiple services
Suspicious execution chain found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Glupteba
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1341137 Sample: 25b910d56003eca83f175318e32... Startdate: 11/11/2023 Architecture: WINDOWS Score: 100 180 Multi AV Scanner detection for domain / URL 2->180 182 Found malware configuration 2->182 184 Malicious sample detected (through community Yara rule) 2->184 186 20 other signatures 2->186 13 25b910d56003eca83f175318e3245c5bbcb83058cd570.exe 1 4 2->13         started        16 TypeId.exe 2->16         started        19 svchost.exe 1 2 2->19         started        22 2 other processes 2->22 process3 dnsIp4 140 C:\Users\user\AppData\Local\...\KT7ZX30.exe, PE32 13->140 dropped 142 C:\Users\user\AppData\Local\...\9vc6To7.exe, PE32 13->142 dropped 24 KT7ZX30.exe 1 4 13->24         started        172 Multi AV Scanner detection for dropped file 16->172 174 Machine Learning detection for dropped file 16->174 176 Modifies the context of a thread in another process (thread injection) 16->176 178 2 other signatures 16->178 148 23.60.72.63 AKAMAI-ASUS United States 19->148 150 127.0.0.1 unknown unknown 19->150 28 chrome.exe 22->28         started        file5 signatures6 process7 file8 120 C:\Users\user\AppData\Local\...\YU9Sb48.exe, PE32 24->120 dropped 122 C:\Users\user\AppData\Local\...\8Rp246Jv.exe, PE32 24->122 dropped 240 Antivirus detection for dropped file 24->240 242 Multi AV Scanner detection for dropped file 24->242 244 Machine Learning detection for dropped file 24->244 30 YU9Sb48.exe 1 4 24->30         started        signatures9 process10 file11 144 C:\Users\user\AppData\Local\...\Mp2pK73.exe, PE32 30->144 dropped 146 C:\Users\user\AppData\Local\...\7cY43tD.exe, PE32 30->146 dropped 280 Antivirus detection for dropped file 30->280 282 Multi AV Scanner detection for dropped file 30->282 284 Machine Learning detection for dropped file 30->284 34 7cY43tD.exe 30->34         started        37 Mp2pK73.exe 1 4 30->37         started        signatures12 process13 file14 188 Antivirus detection for dropped file 34->188 190 Multi AV Scanner detection for dropped file 34->190 192 Machine Learning detection for dropped file 34->192 196 5 other signatures 34->196 40 explorer.exe 34->40 injected 116 C:\Users\user\AppData\Local\...\2Pc5460.exe, PE32 37->116 dropped 118 C:\Users\user\AppData\Local\...\1gv16pJ4.exe, PE32 37->118 dropped 194 Binary is likely a compiled AutoIt script file 37->194 45 1gv16pJ4.exe 12 37->45         started        47 2Pc5460.exe 1 37->47         started        signatures15 process16 dnsIp17 166 103.152.79.123 TWIDC-AS-APTWIDCLimitedHK unknown 40->166 168 185.196.9.161 SIMPLECARRIERCH Switzerland 40->168 170 7 other IPs or domains 40->170 124 C:\Users\user\AppData\Roaming\vvdvjgs, PE32 40->124 dropped 126 C:\Users\user\AppData\Local\TempBFD.exe, PE32+ 40->126 dropped 128 C:\Users\user\AppData\Local\Temp\D99B.exe, PE32+ 40->128 dropped 130 8 other malicious files 40->130 dropped 246 System process connects to network (likely due to code injection or exploit) 40->246 248 Benign windows process drops PE files 40->248 250 Adds a directory exclusion to Windows Defender 40->250 252 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->252 49 D42E.exe 40->49         started        53 AE27.exe 40->53         started        56 EBFD.exe 40->56         started        64 5 other processes 40->64 254 Binary is likely a compiled AutoIt script file 45->254 256 Machine Learning detection for dropped file 45->256 258 Found API chain indicative of sandbox detection 45->258 260 Contains functionality to modify clipboard data 45->260 58 chrome.exe 9 45->58         started        60 chrome.exe 45->60         started        62 chrome.exe 45->62         started        66 7 other processes 45->66 262 Antivirus detection for dropped file 47->262 264 Contains functionality to inject code into remote processes 47->264 266 Writes to foreign memory regions 47->266 268 2 other signatures 47->268 68 2 other processes 47->68 file18 signatures19 process20 dnsIp21 104 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 49->104 dropped 106 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 49->106 dropped 108 C:\Users\user\AppData\...\InstallSetup5.exe, PE32 49->108 dropped 110 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 49->110 dropped 198 Antivirus detection for dropped file 49->198 200 Multi AV Scanner detection for dropped file 49->200 202 Machine Learning detection for dropped file 49->202 204 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 49->204 70 31839b57a4f11171d6abc8bbc4451ee4.exe 49->70         started        82 5 other processes 49->82 158 194.49.94.80 EQUEST-ASNL unknown 53->158 206 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 53->206 208 Found many strings related to Crypto-Wallets (likely being stolen) 53->208 210 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 53->210 212 Tries to harvest and steal browser information (history, passwords, etc) 53->212 73 conhost.exe 53->73         started        214 Modifies the context of a thread in another process (thread injection) 56->214 216 Injects a PE file into a foreign processes 56->216 75 EBFD.exe 56->75         started        160 192.168.2.5 unknown unknown 58->160 162 239.255.255.250 unknown Reserved 58->162 218 Suspicious execution chain found 58->218 84 3 other processes 58->84 78 chrome.exe 60->78         started        80 chrome.exe 62->80         started        112 C:\Users\user\...\mQkCzGWxBToYfUP.data, PE32 64->112 dropped 114 C:\Users\user\...\IwVytdoydmsIEGs.data, PE32 64->114 dropped 220 Writes to foreign memory regions 64->220 222 Allocates memory in foreign processes 64->222 87 4 other processes 64->87 89 7 other processes 66->89 164 5.42.92.43 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 68->164 file22 signatures23 process24 dnsIp25 224 Multi AV Scanner detection for dropped file 70->224 226 Detected unpacking (changes PE section rights) 70->226 228 Detected unpacking (overwrites its own PE header) 70->228 238 2 other signatures 70->238 91 cmd.exe 70->91         started        132 C:\Users\user\AppData\Local\...\TypeId.exe, PE32+ 75->132 dropped 230 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 75->230 134 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 82->134 dropped 136 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 82->136 dropped 138 C:\Windows\System32\drivers\etc\hosts, ASCII 82->138 dropped 232 Modifies the hosts file 82->232 234 Adds a directory exclusion to Windows Defender 82->234 236 Injects a PE file into a foreign processes 82->236 93 toolspub2.exe 82->93         started        96 Broom.exe 82->96         started        152 104.244.42.129 TWITTERUS United States 84->152 154 104.244.42.195 TWITTERUS United States 84->154 156 76 other IPs or domains 84->156 file26 signatures27 process28 signatures29 98 conhost.exe 91->98         started        100 fodhelper.exe 91->100         started        102 fodhelper.exe 91->102         started        270 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 93->270 272 Maps a DLL or memory area into another process 93->272 274 Checks if the current machine is a virtual machine (disk enumeration) 93->274 276 Creates a thread in another existing process (thread injection) 93->276 278 Multi AV Scanner detection for dropped file 96->278 process30
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2023-11-11 17:26:06 UTC
File Type:
PE (Exe)
Extracted files:
174
AV detection:
20 of 23 (86.96%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
brand:paypal persistence phishing
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
AutoIT Executable
Detected potential entity reuse from brand paypal.
Adds Run key to start application
Executes dropped EXE
Unpacked files
SH256 hash:
a7f66057e50910d96a36424eb4da3de8b9cd4a306f9ab0b59362f27409f91e35
MD5 hash:
f562aaab6ca23d0e9b0846e4ed2e2705
SHA1 hash:
c8fc45ff9b31f44f4f79f2f8601ef95146769aae
SH256 hash:
2788a5c483967dc8ed953aa1ae6e343160d03520947b922eddc306c551785960
MD5 hash:
4cc221f92b3c238230edc0121a208c49
SHA1 hash:
b54aca6dd8c83ddd01d4bc0131db76939eed9148
Detections:
win_smokeloader_a2
SH256 hash:
25b910d56003eca83f175318e3245c5bbcb83058cd570c64078a02948e87be7c
MD5 hash:
ba9266e00d09ce9ea5c05cdae8cfa527
SHA1 hash:
f7bcba55863f96df3ebcc3180af9be52b5eac2ca
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments