MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357 |
|---|---|
| SHA3-384 hash: | 00c1ad53ffaf70cf4c1fd076add25c8f7d63ad5ac482f2fc9f6ca444f099e093527ef6762684b4351bb8bc7f22e191a6 |
| SHA1 hash: | 5fc219353c90adb71cb2d71e5bc5aec0f7f93edd |
| MD5 hash: | 3036473dbbc33e438e536cf37197b837 |
| humanhash: | lake-equal-pip-hotel |
| File name: | 2A9E7BC07BD4EC39C2BEAA42FF35352BBE6400F899F70.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 4'291'192 bytes |
| First seen: | 2021-11-26 20:36:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 98304:yL+w7w6JR5BxyUZ+SWCAv3k8kUFEh4ua8yZXbZo:yC/wHevUhu44RW |
| Threatray | 1'664 similar samples on MalwareBazaar |
| TLSH | T12F1633165D26DB5ED20741F58DDB6E42BC1D9023AF68F132663CEB00D8AFB496850ABC |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 65.21.226.115:27660 | https://threatfox.abuse.ch/ioc/254928/ |
| http://94.158.245.199/ | https://threatfox.abuse.ch/ioc/254998/ |
| 168.119.104.184:22192 | https://threatfox.abuse.ch/ioc/254999/ |
| 103.246.144.29:44301 | https://threatfox.abuse.ch/ioc/255007/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
219
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
DNS request
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Creating a window
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Sending an HTTP GET request
Reading critical registry keys
Query of malicious DNS domain
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed ramnit wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Vidar
Verdict:
Malicious
Result
Threat name:
RedLine Vidar Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Detected unpacking (overwrites its own PE header)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RedLine Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Yara Genericmalware
Behaviour
Behavior Graph:
Detection:
redlinestealer
Threat name:
Win32.Infostealer.Passteal
Status:
Malicious
First seen:
2021-11-24 12:41:22 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
28 of 45 (62.22%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
emotet
Similar samples:
+ 1'654 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:vidar botnet:706 botnet:pab777 aspackv2 backdoor evasion infostealer spyware stealer trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
https://kipriauka.tumblr.com/
185.215.113.15:6043
http://nalirou70.top/
http://xacokuo80.top/
185.215.113.15:6043
http://nalirou70.top/
http://xacokuo80.top/
Unpacked files
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
1c23673f583088fb1a0352afa1765ed1e62d9d2081cea8b67af3b20f38bd77e1
MD5 hash:
a694ec82c1caa4fe7569fbc1f7b706a3
SHA1 hash:
e951aa38653e2309dc760c0f118ca100f633053a
SH256 hash:
2fc6ce580406bc6f5ea55f1aaf254eace3454e7da857220de17a9101df476b10
MD5 hash:
52a8046147f8e17f5e9a88451b67d331
SHA1 hash:
c0f0848309c9429007569a7959eac0dd7723d534
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
db7d65ad671baacad315ff9c5b64f9eea46ec849d1cec94647c4e1188e87e958
MD5 hash:
bf673fb5bac0d40191c9679af0a66a6e
SHA1 hash:
6135cf21fc0fb95b9a10fbb04326b863aa6df759
SH256 hash:
d4ce1c2d73c49960329244d20cadd19c75ba410f2eabbaa03852435c20a74e7c
MD5 hash:
b70d78c71d3ea295544d99ea27cc6e40
SHA1 hash:
59f430de7610638ec3c8a75fecbfffbba288afa0
SH256 hash:
5eeb70d2d0281b1102b48bd5c160fa1199c9630ab5d12ef9077acfc300fe82aa
MD5 hash:
e856a556d404abae426029f407a89d6f
SHA1 hash:
2fb4c7890e7b1fef757a84af28ad34b4be529915
SH256 hash:
78c9932e31cdabe2c2a2573bbafae1feadde1cef58d8ff9eb56f53a1756e7590
MD5 hash:
e32a4a6925776c66b5c1bab7d1335d14
SHA1 hash:
1ae1094bcd31bb68f472d572f1bbc7d1b347de98
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
aff5052dcaceac8cc0d97983c19091be8f1d2fa3b2ea4f649adf0c16855bc8b8
MD5 hash:
b32e81cfce4fb1d3a87156891c95e35c
SHA1 hash:
9a1b6b18d71016d4b7ebe5abbfaaa204d51ece86
SH256 hash:
3fccf0062245a335964b95c370581f71e24eb2c1edd231bc30ac8ddf63bbf367
MD5 hash:
721b9800ee1c7d81afbca0290b95dae9
SHA1 hash:
03dac58fa2d1aa895b37ed1d3b22fe756be73b58
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e173de6e79423d659886704dcaaf5848078ced4e14e0772e4f1e7b3931bb0862
MD5 hash:
95f9e24e7dd90ee5892743c58801db9f
SHA1 hash:
f107fcd45e57e7b71193f1f1777b8377f5d3cda1
SH256 hash:
e621e23cf07ea962557bce0f28940a8283135de86d3fd3d520d58115a8484982
MD5 hash:
35959e37d587e649357c57c2c5797a93
SHA1 hash:
b3f2ef17f1c45e34ea84a70285a14672034a97ae
SH256 hash:
4266165affda48b7a0fc19e67760e2d0ff275bf5f66d463acdf89c17362c3022
MD5 hash:
6e5515bdee2907426548266c47390abc
SHA1 hash:
105000cfd2dcd2e5f5f5f9e1f5ab4eff4626473e
SH256 hash:
5050bc56c683a4dbfda08b43d68973961458fd712164c3792d060153c2bd7027
MD5 hash:
f9210936145be5d696c5c80f8f464a58
SHA1 hash:
4647f8be74272b9a6d6d039fc6bb68aca0c8b49c
SH256 hash:
856406c9c7b31f0c00351ad33116eef6266e808f62707dbdd452d78d87c15b49
MD5 hash:
dcb44b893efae5ddd8cb122af5c988f2
SHA1 hash:
b7a5c73b39271c594545f0d35e5c1f739f37fa7f
Detections:
win_oski_g0
Parent samples :
71a117de440384fdc4b8fb690fc73674e9e2a9a75e68951ae798374808924264
33cbd9e39dd39a84d0426897605b17000046e0fb14399e9d0bf47b55c0e3ad8b
b10274561191cedb0b16d2a69fdcd4e5062edfe2621842eacd55945ffded3f57
6dfd902231e6aa1301c11eca21f5a29456aa020bfe1eb19d05541ab32316a326
2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
15f4e965344a38b07713363133e6624f72db10cb297967e91608eec1020e6b1d
33cbd9e39dd39a84d0426897605b17000046e0fb14399e9d0bf47b55c0e3ad8b
b10274561191cedb0b16d2a69fdcd4e5062edfe2621842eacd55945ffded3f57
6dfd902231e6aa1301c11eca21f5a29456aa020bfe1eb19d05541ab32316a326
2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
15f4e965344a38b07713363133e6624f72db10cb297967e91608eec1020e6b1d
SH256 hash:
f77cb65d6e77bc70698c98ee969e022b9ce716cbbe4868c0a2f53171176d0a80
MD5 hash:
5a0c915ecdb14590804e61bacaf79619
SHA1 hash:
548f84a46cf0a9f079a419fa25de423101c2f32f
SH256 hash:
55ef0fdd4a636e0ff407ca0e078dcf5de394ee87dd758f4c16ae591951798c23
MD5 hash:
b17701275430ecbb9aa3cde0e5d41305
SHA1 hash:
ce1f602a5f2c7fd7a94b6142260193083776eb5d
SH256 hash:
c768c6bd525a1f59f5be8c2ce8d36b79ee41e9ed1a949ff1d7058e305b391cc2
MD5 hash:
a67a540fda86ee25dd6f80958c03d886
SHA1 hash:
4607120d89ebf7b7ead66c66af963484521129f9
SH256 hash:
5650222a89073461dd9c3b0804c4d0dbbed36ba64fc3225c575048ebff44b918
MD5 hash:
acd329d6ef99d8d003a7a3a7cf702d0f
SHA1 hash:
6c082bdc23f2a8b25a36e5422051a720e90c5b3a
SH256 hash:
19438586ed62cbaae7560303a7f0fd20b9eaa2b27153a62d33038e1a87a8b185
MD5 hash:
d3ece3ff2e9e39761a13534f3264d13e
SHA1 hash:
f30fed2c173319fea598e0531f73eee9ecebd2b0
SH256 hash:
2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
MD5 hash:
3036473dbbc33e438e536cf37197b837
SHA1 hash:
5fc219353c90adb71cb2d71e5bc5aec0f7f93edd
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.