MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2992c4b00c678a438b0b935e09e0fd341a44c46fe0dd2f18621570f55133e4df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 2 YARA 4 File information Comments

SHA256 hash: 2992c4b00c678a438b0b935e09e0fd341a44c46fe0dd2f18621570f55133e4df
SHA3-384 hash: 434e9b3a05b97ef873b5eccbcf8f06e351c081722d28c81db11f3c47ba13d8b802b30eb62109eb03d27aa99a739f5e77
SHA1 hash: 5ac41859cefd7ad0536b36c7e82f33e702514fe2
MD5 hash: 244f3fcae34a514dd3e78f3d4d72f92a
humanhash: july-july-zulu-papa
File name:2992C4B00C678A438B0B935E09E0FD341A44C46FE0DD2.exe
Download: download sample
Signature RedLineStealer
File size:4'591'150 bytes
First seen:2021-12-26 18:40:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JhIC2Za3nLAzeM2nAN6DA62todUINX7LrWHLgiVn3RNE:JhICca3LAzebe6DAVtqLLKHvn3RNE
TLSH T14626331C510B4DB3C2121EF98872EF35ADD1BD17895F41CD6BAA2EA883236DF5C095A2
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.9.20.253:11452

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.9.20.253:11452 https://threatfox.abuse.ch/ioc/287667/
185.215.113.85:13374 https://threatfox.abuse.ch/ioc/287794/

Intelligence


File Origin
# of uploads :
1
# of downloads :
319
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2992C4B00C678A438B0B935E09E0FD341A44C46FE0DD2.exe
Verdict:
No threats detected
Analysis date:
2021-12-26 18:44:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process
Query of malicious DNS domain
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
arkeistealer barys mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Socelars
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Disables Windows Defender (via service or powershell)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 545452 Sample: 2992C4B00C678A438B0B935E09E... Startdate: 26/12/2021 Architecture: WINDOWS Score: 100 41 Found malware configuration 2->41 43 Antivirus detection for dropped file 2->43 45 Antivirus / Scanner detection for submitted sample 2->45 47 13 other signatures 2->47 9 2992C4B00C678A438B0B935E09E0FD341A44C46FE0DD2.exe 10 2->9         started        process3 file4 31 C:\Users\user\AppData\...\setup_installer.exe, PE32 9->31 dropped 12 setup_installer.exe 20 9->12         started        process5 file6 33 C:\Users\user\AppData\...\setup_install.exe, PE32 12->33 dropped 35 C:\Users\user\...\Sun07fbac34efb13666.exe, PE32 12->35 dropped 37 C:\Users\user\...\Sun07b9107c074617.exe, PE32 12->37 dropped 39 15 other files (10 malicious) 12->39 dropped 15 setup_install.exe 1 12->15         started        process7 signatures8 53 Adds a directory exclusion to Windows Defender 15->53 55 Disables Windows Defender (via service or powershell) 15->55 18 cmd.exe 1 15->18         started        21 cmd.exe 1 15->21         started        23 conhost.exe 15->23         started        25 cmd.exe 15->25         started        process9 signatures10 49 Adds a directory exclusion to Windows Defender 18->49 51 Disables Windows Defender (via service or powershell) 18->51 27 powershell.exe 24 18->27         started        29 powershell.exe 25 21->29         started        process11
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-10-24 10:44:54 UTC
File Type:
PE (Exe)
Extracted files:
123
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:smokeloader family:socelars aspackv2 backdoor spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Process spawned unexpected child process
SmokeLoader
Socelars
Socelars Payload
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Unpacked files
SH256 hash:
793f5792a9bec84bf6d1ebdf333d620034ff29dbf88f961362cdd0965a320f5d
MD5 hash:
04a32a197795c39cbc743d0e81dd51ae
SHA1 hash:
fe4cf033acfc880d717eeb1cc1e8620d5964a0b7
SH256 hash:
27a9228747973ae9649e8717a2ff77916346560644e734ef2ed946f2767fb128
MD5 hash:
de1b3c28ea026c0ede620dd78199ddc5
SHA1 hash:
ee402371a36bff44c765323ccd8c7e4a56bc8d12
SH256 hash:
82b60a8c25db65bae520e73b7a67d2a6ca1f0fe6926439d0d7f1c0d52aa2f7d4
MD5 hash:
a758705ffd480485776c573bbe7091ca
SHA1 hash:
ae62bd009da6c2bf8e91f06a9a01890f74828d07
SH256 hash:
8674f2de167a8a7cdab03806cf4632d9a24bc3c9caa93fb08cbb5238df3abb9d
MD5 hash:
ffa7e04fb10a934c51d3f7df77b397b0
SHA1 hash:
a02e4b9dc074606b94442651ee6a22e4a56f3842
SH256 hash:
4e898acb25403c63a2e2e12575cb6ef29a47b4687c4f1674c39b082a7caf6c52
MD5 hash:
83d83079016f2a3245ff0ce70d9eb23f
SHA1 hash:
819c2a181573a7f6da186cdf5e7483127ee14c74
SH256 hash:
9daa75d4e8552204318b356c85d41b6d12c725270c806aa1c49da3aba6ffd90f
MD5 hash:
15d62698e147bb48018bde81574478fb
SHA1 hash:
7078dcaa7fb9a326ad55e67957dd60b67c67b230
SH256 hash:
e9d6ae4bea7e801a69560817efb86338a4523c815a38a74868d5c60317240691
MD5 hash:
fe4f7a7712056fdd567dd6cc53feab86
SHA1 hash:
5e4ae5fc4f3dc9b6353e235b6be56c6156c0d84d
SH256 hash:
7a48d4d69740d5220828f89dd13a2afc388b97f8ca95e0e6b59a4f52f8978992
MD5 hash:
0d87f8253811f83a957ec9ac8aceae89
SHA1 hash:
58bd4d7f63c45ecd20f9174dc3f5947942bdf82b
SH256 hash:
89c475fec172c5b013a5f04eedf8ed4b323ddc00a5562ed143ee1fe1184ec7e3
MD5 hash:
0ed158185422eca29db7a770836e7968
SHA1 hash:
197f0887b4ff31c3eed2f6e1aa9a43ecd88791fc
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
8e6f8b4a3b61b8122bb7688e505f3367bd428991188c4534ab5436ac5d539794
MD5 hash:
c9070a626691d8aa6e4aef9913592265
SHA1 hash:
ce0326e7a6a1fb6c5cf3f87074ebdfdc2f5277ff
SH256 hash:
ffb0fcede542fa2a31553073105b74f85e3a6d92987392dcce5e5e49743c878b
MD5 hash:
688bb186be4be7a4e668f4dff71ce220
SHA1 hash:
bc06b533f88e5260bdb9f63d19bac9fe71ee5c64
SH256 hash:
86aaf0806dddc5c980a61f10129de7f9c40009732b6a57a7a0d7ae70e28346b1
MD5 hash:
25c0c6eeb463ce7298ac3be833a917ae
SHA1 hash:
57608620766831b9f0a51819a18656b55de752a5
SH256 hash:
db141a583b603cb48bb55630d84608fda20806b52d4beda22d46d2d960c71f58
MD5 hash:
906d654a4d63a3aa1850bd711716b533
SHA1 hash:
e35d16d6ef70b0eed1d61ef16093e25a9e4a0299
SH256 hash:
718faee3d4287b0504ccd0246cb84dc05cb07db5f8bdcbcbc9a451ab9bf3c796
MD5 hash:
922490fca68d3237bb7d9b68df963ebe
SHA1 hash:
1ab636a436bf7011919a14ebba03e48833095289
SH256 hash:
0f01dda9c27719068f51ea680f395fc740935af6762e350ee36429e2b44ec131
MD5 hash:
4b88ffc2f0348c952115166eff42f60a
SHA1 hash:
2b419c3001b146da2bebcbf1d0c764e164198eb7
Detections:
win_retefe_auto
SH256 hash:
2992c4b00c678a438b0b935e09e0fd341a44c46fe0dd2f18621570f55133e4df
MD5 hash:
244f3fcae34a514dd3e78f3d4d72f92a
SHA1 hash:
5ac41859cefd7ad0536b36c7e82f33e702514fe2
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_onlyLogger
Author:ditekSHen
Description:Detects onlyLogger loader variants
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments