MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 4 YARA File information Comments

SHA256 hash: 2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
SHA3-384 hash: 00c1ad53ffaf70cf4c1fd076add25c8f7d63ad5ac482f2fc9f6ca444f099e093527ef6762684b4351bb8bc7f22e191a6
SHA1 hash: 5fc219353c90adb71cb2d71e5bc5aec0f7f93edd
MD5 hash: 3036473dbbc33e438e536cf37197b837
humanhash: lake-equal-pip-hotel
File name:2A9E7BC07BD4EC39C2BEAA42FF35352BBE6400F899F70.exe
Download: download sample
Signature RedLineStealer
File size:4'291'192 bytes
First seen:2021-11-26 20:36:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yL+w7w6JR5BxyUZ+SWCAv3k8kUFEh4ua8yZXbZo:yC/wHevUhu44RW
Threatray 1'664 similar samples on MalwareBazaar
TLSH T12F1633165D26DB5ED20741F58DDB6E42BC1D9023AF68F132663CEB00D8AFB496850ABC
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
65.21.226.115:27660

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
65.21.226.115:27660 https://threatfox.abuse.ch/ioc/254928/
http://94.158.245.199/ https://threatfox.abuse.ch/ioc/254998/
168.119.104.184:22192 https://threatfox.abuse.ch/ioc/254999/
103.246.144.29:44301 https://threatfox.abuse.ch/ioc/255007/

Intelligence


File Origin
# of uploads :
1
# of downloads :
219
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
DNS request
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Creating a window
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Sending an HTTP GET request
Reading critical registry keys
Query of malicious DNS domain
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed ramnit wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Vidar Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Detected unpacking (overwrites its own PE header)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RedLine Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 529460 Sample: 2A9E7BC07BD4EC39C2BEAA42FF3... Startdate: 26/11/2021 Architecture: WINDOWS Score: 100 88 a.goatgame.co 2->88 90 136.144.41.58, 49789, 49814, 49817 WORLDSTREAMNL Netherlands 2->90 92 17 other IPs or domains 2->92 112 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->112 114 Antivirus detection for URL or domain 2->114 116 Antivirus detection for dropped file 2->116 120 20 other signatures 2->120 13 2A9E7BC07BD4EC39C2BEAA42FF35352BBE6400F899F70.exe 10 2->13         started        16 svchost.exe 1 2->16         started        signatures3 118 Performs DNS queries to domains with low reputation 88->118 process4 file5 74 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 13->74 dropped 18 setup.exe 8 13->18         started        process6 file7 62 C:\Users\user\AppData\Local\...\zlib1.dll, PE32 18->62 dropped 64 C:\Users\user\AppData\...\setup_install.exe, PE32 18->64 dropped 66 C:\Users\user\AppData\Local\...\libzip.dll, PE32 18->66 dropped 68 3 other files (none is malicious) 18->68 dropped 21 setup_install.exe 3 18->21         started        process8 file9 70 C:\Users\user\AppData\...\ddb41dd0ec60.exe, PE32 21->70 dropped 24 cmd.exe 1 21->24         started        27 conhost.exe 21->27         started        process10 signatures11 122 Adds a directory exclusion to Windows Defender 24->122 29 ddb41dd0ec60.exe 16 24->29         started        process12 file13 76 C:\Users\user\AppData\...\setup_install.exe, PE32 29->76 dropped 78 C:\Users\user\AppData\...\Mon18c08fd4fa.exe, PE32 29->78 dropped 80 C:\Users\user\...\Mon18a0392b30371.exe, PE32+ 29->80 dropped 82 11 other files (6 malicious) 29->82 dropped 32 setup_install.exe 1 29->32         started        process14 dnsIp15 84 127.0.0.1 unknown unknown 32->84 86 hsiens.xyz 32->86 108 Performs DNS queries to domains with low reputation 32->108 110 Adds a directory exclusion to Windows Defender 32->110 36 cmd.exe 1 32->36         started        38 cmd.exe 32->38         started        40 cmd.exe 32->40         started        42 6 other processes 32->42 signatures16 process17 signatures18 45 Mon18038e466dae7.exe 36->45         started        49 Mon18a0392b30371.exe 38->49         started        51 Mon187311886a9f92f91.exe 40->51         started        124 Adds a directory exclusion to Windows Defender 42->124 53 Mon1875dad6fcda9f63c.exe 42->53         started        56 Mon18854a098a.exe 42->56         started        58 Mon18c08fd4fa.exe 2 42->58         started        60 powershell.exe 25 42->60         started        process19 dnsIp20 94 kipriauka.tumblr.com 74.114.154.18, 443, 49812, 49815 AUTOMATTICUS Canada 45->94 126 Antivirus detection for dropped file 45->126 128 Multi AV Scanner detection for dropped file 45->128 130 Machine Learning detection for dropped file 45->130 96 staticimg.youtuuee.com 49->96 98 ip-api.com 208.95.112.1, 49754, 80 TUT-ASUS United States 49->98 104 2 other IPs or domains 49->104 132 May check the online IP address of the machine 49->132 134 Tries to harvest and steal browser information (history, passwords, etc) 49->134 100 185.215.113.15, 6043 WHOLESALECONNECTIONSNL Portugal 51->100 102 staticimg.youtuuee.com 51->102 136 Detected unpacking (overwrites its own PE header) 51->136 72 C:\Users\user\...\Mon1875dad6fcda9f63c.tmp, PE32 53->72 dropped 138 Obfuscated command line found 53->138 106 7 other IPs or domains 56->106 140 Performs DNS queries to domains with low reputation 56->140 file21 signatures22
Threat name:
Win32.Infostealer.Passteal
Status:
Malicious
First seen:
2021-11-24 12:41:22 UTC
File Type:
PE (Exe)
Extracted files:
16
AV detection:
28 of 45 (62.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:706 botnet:pab777 aspackv2 backdoor evasion infostealer spyware stealer trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
https://kipriauka.tumblr.com/
185.215.113.15:6043
http://nalirou70.top/
http://xacokuo80.top/
Unpacked files
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
1c23673f583088fb1a0352afa1765ed1e62d9d2081cea8b67af3b20f38bd77e1
MD5 hash:
a694ec82c1caa4fe7569fbc1f7b706a3
SHA1 hash:
e951aa38653e2309dc760c0f118ca100f633053a
SH256 hash:
2fc6ce580406bc6f5ea55f1aaf254eace3454e7da857220de17a9101df476b10
MD5 hash:
52a8046147f8e17f5e9a88451b67d331
SHA1 hash:
c0f0848309c9429007569a7959eac0dd7723d534
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
db7d65ad671baacad315ff9c5b64f9eea46ec849d1cec94647c4e1188e87e958
MD5 hash:
bf673fb5bac0d40191c9679af0a66a6e
SHA1 hash:
6135cf21fc0fb95b9a10fbb04326b863aa6df759
SH256 hash:
d4ce1c2d73c49960329244d20cadd19c75ba410f2eabbaa03852435c20a74e7c
MD5 hash:
b70d78c71d3ea295544d99ea27cc6e40
SHA1 hash:
59f430de7610638ec3c8a75fecbfffbba288afa0
SH256 hash:
5eeb70d2d0281b1102b48bd5c160fa1199c9630ab5d12ef9077acfc300fe82aa
MD5 hash:
e856a556d404abae426029f407a89d6f
SHA1 hash:
2fb4c7890e7b1fef757a84af28ad34b4be529915
SH256 hash:
78c9932e31cdabe2c2a2573bbafae1feadde1cef58d8ff9eb56f53a1756e7590
MD5 hash:
e32a4a6925776c66b5c1bab7d1335d14
SHA1 hash:
1ae1094bcd31bb68f472d572f1bbc7d1b347de98
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
aff5052dcaceac8cc0d97983c19091be8f1d2fa3b2ea4f649adf0c16855bc8b8
MD5 hash:
b32e81cfce4fb1d3a87156891c95e35c
SHA1 hash:
9a1b6b18d71016d4b7ebe5abbfaaa204d51ece86
SH256 hash:
3fccf0062245a335964b95c370581f71e24eb2c1edd231bc30ac8ddf63bbf367
MD5 hash:
721b9800ee1c7d81afbca0290b95dae9
SHA1 hash:
03dac58fa2d1aa895b37ed1d3b22fe756be73b58
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e173de6e79423d659886704dcaaf5848078ced4e14e0772e4f1e7b3931bb0862
MD5 hash:
95f9e24e7dd90ee5892743c58801db9f
SHA1 hash:
f107fcd45e57e7b71193f1f1777b8377f5d3cda1
SH256 hash:
e621e23cf07ea962557bce0f28940a8283135de86d3fd3d520d58115a8484982
MD5 hash:
35959e37d587e649357c57c2c5797a93
SHA1 hash:
b3f2ef17f1c45e34ea84a70285a14672034a97ae
SH256 hash:
4266165affda48b7a0fc19e67760e2d0ff275bf5f66d463acdf89c17362c3022
MD5 hash:
6e5515bdee2907426548266c47390abc
SHA1 hash:
105000cfd2dcd2e5f5f5f9e1f5ab4eff4626473e
SH256 hash:
5050bc56c683a4dbfda08b43d68973961458fd712164c3792d060153c2bd7027
MD5 hash:
f9210936145be5d696c5c80f8f464a58
SHA1 hash:
4647f8be74272b9a6d6d039fc6bb68aca0c8b49c
SH256 hash:
f77cb65d6e77bc70698c98ee969e022b9ce716cbbe4868c0a2f53171176d0a80
MD5 hash:
5a0c915ecdb14590804e61bacaf79619
SHA1 hash:
548f84a46cf0a9f079a419fa25de423101c2f32f
SH256 hash:
55ef0fdd4a636e0ff407ca0e078dcf5de394ee87dd758f4c16ae591951798c23
MD5 hash:
b17701275430ecbb9aa3cde0e5d41305
SHA1 hash:
ce1f602a5f2c7fd7a94b6142260193083776eb5d
SH256 hash:
c768c6bd525a1f59f5be8c2ce8d36b79ee41e9ed1a949ff1d7058e305b391cc2
MD5 hash:
a67a540fda86ee25dd6f80958c03d886
SHA1 hash:
4607120d89ebf7b7ead66c66af963484521129f9
SH256 hash:
5650222a89073461dd9c3b0804c4d0dbbed36ba64fc3225c575048ebff44b918
MD5 hash:
acd329d6ef99d8d003a7a3a7cf702d0f
SHA1 hash:
6c082bdc23f2a8b25a36e5422051a720e90c5b3a
SH256 hash:
19438586ed62cbaae7560303a7f0fd20b9eaa2b27153a62d33038e1a87a8b185
MD5 hash:
d3ece3ff2e9e39761a13534f3264d13e
SHA1 hash:
f30fed2c173319fea598e0531f73eee9ecebd2b0
SH256 hash:
2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
MD5 hash:
3036473dbbc33e438e536cf37197b837
SHA1 hash:
5fc219353c90adb71cb2d71e5bc5aec0f7f93edd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments